Analysis
-
max time kernel
1735s -
max time network
1838s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 18:41
Static task
static1
Behavioral task
behavioral1
Sample
nady6.dll
Resource
win7v20210408
General
-
Target
nady6.dll
-
Size
1.3MB
-
MD5
1f45bcf1fb8b7ef74a57d19a371f41cf
-
SHA1
9b7f346a04f8481c22fb6f8853f76349402a7009
-
SHA256
aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1
-
SHA512
6cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 684 created 1208 684 regsvr32.exe Explorer.EXE -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 684 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\RealtechUpdate = "\"C:\\Windows\\system32\\regsvr32.exe\" /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Damp\\keimjdkhqxa.exe\" mscp arih" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
regsvr32.exechrome.exedescription pid process target process PID 684 set thread context of 956 684 regsvr32.exe chrome.exe PID 956 set thread context of 1396 956 chrome.exe chrome.exe -
Modifies registry key 1 TTPs 6 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exepid process 1284 reg.exe 1720 reg.exe 552 reg.exe 1032 reg.exe 1548 reg.exe 1296 reg.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 744 regsvr32.exe 684 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
regsvr32.exeregsvr32.exechrome.exepid process 744 regsvr32.exe 684 regsvr32.exe 684 regsvr32.exe 956 chrome.exe 956 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.execmd.exeregsvr32.execmd.execmd.exeregsvr32.execmd.execmd.exechrome.execmd.execmd.execmd.exedescription pid process target process PID 816 wrote to memory of 792 816 regsvr32.exe cmd.exe PID 816 wrote to memory of 792 816 regsvr32.exe cmd.exe PID 816 wrote to memory of 792 816 regsvr32.exe cmd.exe PID 792 wrote to memory of 872 792 cmd.exe PING.EXE PID 792 wrote to memory of 872 792 cmd.exe PING.EXE PID 792 wrote to memory of 872 792 cmd.exe PING.EXE PID 792 wrote to memory of 744 792 cmd.exe regsvr32.exe PID 792 wrote to memory of 744 792 cmd.exe regsvr32.exe PID 792 wrote to memory of 744 792 cmd.exe regsvr32.exe PID 792 wrote to memory of 744 792 cmd.exe regsvr32.exe PID 792 wrote to memory of 744 792 cmd.exe regsvr32.exe PID 744 wrote to memory of 1652 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 1652 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 1652 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 428 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 428 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 428 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 1148 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 1148 744 regsvr32.exe cmd.exe PID 744 wrote to memory of 1148 744 regsvr32.exe cmd.exe PID 428 wrote to memory of 1284 428 cmd.exe reg.exe PID 428 wrote to memory of 1284 428 cmd.exe reg.exe PID 428 wrote to memory of 1284 428 cmd.exe reg.exe PID 1148 wrote to memory of 1824 1148 cmd.exe PING.EXE PID 1148 wrote to memory of 1824 1148 cmd.exe PING.EXE PID 1148 wrote to memory of 1824 1148 cmd.exe PING.EXE PID 1148 wrote to memory of 684 1148 cmd.exe regsvr32.exe PID 1148 wrote to memory of 684 1148 cmd.exe regsvr32.exe PID 1148 wrote to memory of 684 1148 cmd.exe regsvr32.exe PID 1148 wrote to memory of 684 1148 cmd.exe regsvr32.exe PID 1148 wrote to memory of 684 1148 cmd.exe regsvr32.exe PID 684 wrote to memory of 1116 684 regsvr32.exe cmd.exe PID 684 wrote to memory of 1116 684 regsvr32.exe cmd.exe PID 684 wrote to memory of 1116 684 regsvr32.exe cmd.exe PID 1116 wrote to memory of 748 1116 cmd.exe reg.exe PID 1116 wrote to memory of 748 1116 cmd.exe reg.exe PID 1116 wrote to memory of 748 1116 cmd.exe reg.exe PID 684 wrote to memory of 1344 684 regsvr32.exe cmd.exe PID 684 wrote to memory of 1344 684 regsvr32.exe cmd.exe PID 684 wrote to memory of 1344 684 regsvr32.exe cmd.exe PID 1344 wrote to memory of 1952 1344 cmd.exe reg.exe PID 1344 wrote to memory of 1952 1344 cmd.exe reg.exe PID 1344 wrote to memory of 1952 1344 cmd.exe reg.exe PID 684 wrote to memory of 956 684 regsvr32.exe chrome.exe PID 684 wrote to memory of 956 684 regsvr32.exe chrome.exe PID 684 wrote to memory of 956 684 regsvr32.exe chrome.exe PID 684 wrote to memory of 956 684 regsvr32.exe chrome.exe PID 684 wrote to memory of 956 684 regsvr32.exe chrome.exe PID 956 wrote to memory of 1552 956 chrome.exe cmd.exe PID 956 wrote to memory of 1552 956 chrome.exe cmd.exe PID 956 wrote to memory of 1552 956 chrome.exe cmd.exe PID 1552 wrote to memory of 1720 1552 cmd.exe reg.exe PID 1552 wrote to memory of 1720 1552 cmd.exe reg.exe PID 1552 wrote to memory of 1720 1552 cmd.exe reg.exe PID 956 wrote to memory of 1648 956 chrome.exe cmd.exe PID 956 wrote to memory of 1648 956 chrome.exe cmd.exe PID 956 wrote to memory of 1648 956 chrome.exe cmd.exe PID 1648 wrote to memory of 552 1648 cmd.exe reg.exe PID 1648 wrote to memory of 552 1648 cmd.exe reg.exe PID 1648 wrote to memory of 552 1648 cmd.exe reg.exe PID 956 wrote to memory of 1356 956 chrome.exe cmd.exe PID 956 wrote to memory of 1356 956 chrome.exe cmd.exe PID 956 wrote to memory of 1356 956 chrome.exe cmd.exe PID 1356 wrote to memory of 1032 1356 cmd.exe reg.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\nady6.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\nady6.dll" mscp ahis & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 84⤵
- Runs ping.exe
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\nady6.dll" mscp ahis4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c echo %temp%5⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe\" mscp arih"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe\" mscp arih"6⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe" mscp arih & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 86⤵
- Runs ping.exe
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe" mscp arih6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"8⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"8⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" mscp amw fkprm "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query HKCU\Software\WOW64DataView3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe query HKCU\Software\WOW64DataView4⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query HKCU\Software\IfranInfoView3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe query HKCU\Software\IfranInfoView4⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg.exe add HKCU\Software\WOW64DataView /f4⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f /v datetime /t REG_BINARY /d 453E5E4839371F76485F79021318695D1D106C2B2A032F3⤵
-
C:\Windows\system32\reg.exereg.exe add HKCU\Software\WOW64DataView /f /v datetime /t REG_BINARY /d 453E5E4839371F76485F79021318695D1D106C2B2A032F4⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f /v state /t REG_BINARY /d 5661082D3A206A30164078573⤵
-
C:\Windows\system32\reg.exereg.exe add HKCU\Software\WOW64DataView /f /v state /t REG_BINARY /d 5661082D3A206A30164078574⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"3⤵
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"4⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"3⤵
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,34097304542653841524,21028115001970037882,294316 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=621--no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9808 /prefetch:13⤵
-
C:\Windows\system32\cmd.execmd.exe /c "echo %windir%"4⤵
-
C:\Windows\system32\cmd.execmd.exe /c "echo %windir%"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
39c6a52e797c5916a396aa9aef5cae6f
SHA113697e8805d972c149a12ccd8eca47683059fe11
SHA2568f983fb322ba788fada3efefa050cb3f1838d563f50312d5429540109dcb46b0
SHA512ed7d0c514d993ef6cff139ca2f01ee76729cba9bbb88dac3fe04c1c2bad101925d158744b01bc20c8f74f4899972e8a483d359738ce9a9e258fbb9ce8b1f884e
-
C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exeMD5
1f45bcf1fb8b7ef74a57d19a371f41cf
SHA19b7f346a04f8481c22fb6f8853f76349402a7009
SHA256aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1
SHA5126cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f
-
\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exeMD5
1f45bcf1fb8b7ef74a57d19a371f41cf
SHA19b7f346a04f8481c22fb6f8853f76349402a7009
SHA256aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1
SHA5126cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f
-
memory/108-102-0x0000000000000000-mapping.dmp
-
memory/428-67-0x0000000000000000-mapping.dmp
-
memory/552-87-0x0000000000000000-mapping.dmp
-
memory/620-97-0x0000000000000000-mapping.dmp
-
memory/684-75-0x0000000001E90000-0x0000000001EF4000-memory.dmpFilesize
400KB
-
memory/684-71-0x0000000000000000-mapping.dmp
-
memory/688-101-0x0000000000000000-mapping.dmp
-
memory/744-63-0x0000000000000000-mapping.dmp
-
memory/744-65-0x00000000272F0000-0x0000000027354000-memory.dmpFilesize
400KB
-
memory/748-77-0x0000000000000000-mapping.dmp
-
memory/792-61-0x0000000000000000-mapping.dmp
-
memory/816-59-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmpFilesize
8KB
-
memory/816-60-0x0000000027210000-0x0000000027274000-memory.dmpFilesize
400KB
-
memory/872-62-0x0000000000000000-mapping.dmp
-
memory/956-83-0x0000000000EC0000-0x0000000000F24000-memory.dmpFilesize
400KB
-
memory/956-81-0x0000000000B12020-mapping.dmp
-
memory/956-82-0x0000000000970000-0x0000000000B13000-memory.dmpFilesize
1.6MB
-
memory/956-80-0x0000000000970000-0x0000000000B13000-memory.dmpFilesize
1.6MB
-
memory/1028-90-0x0000000000000000-mapping.dmp
-
memory/1032-89-0x0000000000000000-mapping.dmp
-
memory/1064-96-0x0000000000000000-mapping.dmp
-
memory/1116-76-0x0000000000000000-mapping.dmp
-
memory/1148-68-0x0000000000000000-mapping.dmp
-
memory/1284-69-0x0000000000000000-mapping.dmp
-
memory/1296-93-0x0000000000000000-mapping.dmp
-
memory/1312-92-0x0000000000000000-mapping.dmp
-
memory/1344-78-0x0000000000000000-mapping.dmp
-
memory/1356-88-0x0000000000000000-mapping.dmp
-
memory/1396-99-0x0000000000083960-mapping.dmp
-
memory/1396-98-0x0000000000060000-0x00000000000A1000-memory.dmpFilesize
260KB
-
memory/1396-100-0x0000000000060000-0x00000000000A1000-memory.dmpFilesize
260KB
-
memory/1548-91-0x0000000000000000-mapping.dmp
-
memory/1552-84-0x0000000000000000-mapping.dmp
-
memory/1572-95-0x0000000000000000-mapping.dmp
-
memory/1648-86-0x0000000000000000-mapping.dmp
-
memory/1652-66-0x0000000000000000-mapping.dmp
-
memory/1720-85-0x0000000000000000-mapping.dmp
-
memory/1812-94-0x0000000000000000-mapping.dmp
-
memory/1824-70-0x0000000000000000-mapping.dmp
-
memory/1952-79-0x0000000000000000-mapping.dmp