Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 15:35
Static task
static1
Behavioral task
behavioral1
Sample
Nord VPN Brute Checker By MTSoftCrack/Nord VPN Brute Checker.exe
Resource
win10v2004-20220812-en
General
-
Target
Nord VPN Brute Checker By MTSoftCrack/Nord VPN Brute Checker.exe
-
Size
365KB
-
MD5
66371907bd2317b82e2f8e5aef1729e7
-
SHA1
190e7ec2bb64d5f8f12552cab8e66c165bd537ac
-
SHA256
854f6eda174f41f8c018ec4a01d0df8eae63d5200e1ee7581418f80474a2b570
-
SHA512
d6bbaff9b998feed287eb0f8e15208de455c14eeff1c3a510acd0060abe1d651d448250edd9f0a8b1bff23616063ce704832ab88802821cd0361129ac32d6fea
-
SSDEEP
6144:x0A/NP+WybUhuerzIF5ykg7Bi/n42vlHLNbOZ16/w8Y/2PrZyEg2yWRlNQ:xL/t+WFdlM/42vtxbOZ4BYutTNJi
Malware Config
Signatures
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Nord VPN Brute Checker.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nord VPN Brute Checker.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nord VPN Brute Checker.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nord VPN Brute Checker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com 16 icanhazip.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Nord VPN Brute Checker.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Nord VPN Brute Checker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Nord VPN Brute Checker.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
Nord VPN Brute Checker.exepid process 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe 2636 Nord VPN Brute Checker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Nord VPN Brute Checker.exedescription pid process Token: SeDebugPrivilege 2636 Nord VPN Brute Checker.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Nord VPN Brute Checker.execmd.execmd.exedescription pid process target process PID 2636 wrote to memory of 3532 2636 Nord VPN Brute Checker.exe cmd.exe PID 2636 wrote to memory of 3532 2636 Nord VPN Brute Checker.exe cmd.exe PID 3532 wrote to memory of 1908 3532 cmd.exe chcp.com PID 3532 wrote to memory of 1908 3532 cmd.exe chcp.com PID 3532 wrote to memory of 4404 3532 cmd.exe netsh.exe PID 3532 wrote to memory of 4404 3532 cmd.exe netsh.exe PID 3532 wrote to memory of 2156 3532 cmd.exe findstr.exe PID 3532 wrote to memory of 2156 3532 cmd.exe findstr.exe PID 2636 wrote to memory of 404 2636 Nord VPN Brute Checker.exe cmd.exe PID 2636 wrote to memory of 404 2636 Nord VPN Brute Checker.exe cmd.exe PID 404 wrote to memory of 1144 404 cmd.exe chcp.com PID 404 wrote to memory of 1144 404 cmd.exe chcp.com PID 404 wrote to memory of 3656 404 cmd.exe netsh.exe PID 404 wrote to memory of 3656 404 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
Nord VPN Brute Checker.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nord VPN Brute Checker.exe -
outlook_win_path 1 IoCs
Processes:
Nord VPN Brute Checker.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Nord VPN Brute Checker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nord VPN Brute Checker By MTSoftCrack\Nord VPN Brute Checker.exe"C:\Users\Admin\AppData\Local\Temp\Nord VPN Brute Checker By MTSoftCrack\Nord VPN Brute Checker.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2636 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1908
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:4404
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:2156
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1144
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:3656
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:632