Analysis
-
max time kernel
106s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 17:15
Behavioral task
behavioral1
Sample
62714a724abbfc87f6d3e46a446d5fbf.exe
Resource
win7-20220812-en
General
-
Target
62714a724abbfc87f6d3e46a446d5fbf.exe
-
Size
32KB
-
MD5
62714a724abbfc87f6d3e46a446d5fbf
-
SHA1
eacf4b82e080c80d1bd121bcdfc35c52a28b4f0e
-
SHA256
a62751453618735964f32c88d8dbf08d5e27d17b3109a2bb48a15f4ad661a372
-
SHA512
b4f2d8339309b6c742eb4b9027b4486b1b2dafa28c0287bd8a28df9265df7cab2dd7542e263faccc20992e8d6b89f293bae7728efb16961697706976c028e1d1
-
SSDEEP
768:HqPzUdiJ8dayafVcCSWYVYnPrryFbnpoJo2qKc6ziFg:YLJ8dayaaupDobnpo2RGh
Malware Config
Extracted
systembc
89.248.163.218:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
nxdok.exepid process 2044 nxdok.exe -
Drops file in Windows directory 2 IoCs
Processes:
62714a724abbfc87f6d3e46a446d5fbf.exedescription ioc process File created C:\Windows\Tasks\nxdok.job 62714a724abbfc87f6d3e46a446d5fbf.exe File opened for modification C:\Windows\Tasks\nxdok.job 62714a724abbfc87f6d3e46a446d5fbf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
62714a724abbfc87f6d3e46a446d5fbf.exepid process 896 62714a724abbfc87f6d3e46a446d5fbf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1168 wrote to memory of 2044 1168 taskeng.exe nxdok.exe PID 1168 wrote to memory of 2044 1168 taskeng.exe nxdok.exe PID 1168 wrote to memory of 2044 1168 taskeng.exe nxdok.exe PID 1168 wrote to memory of 2044 1168 taskeng.exe nxdok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62714a724abbfc87f6d3e46a446d5fbf.exe"C:\Users\Admin\AppData\Local\Temp\62714a724abbfc87f6d3e46a446d5fbf.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:896
-
C:\Windows\system32\taskeng.exetaskeng.exe {DAAB5A7F-41D5-40EE-8C99-ADFCB0002733} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\ProgramData\wnakgbf\nxdok.exeC:\ProgramData\wnakgbf\nxdok.exe start2⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD562714a724abbfc87f6d3e46a446d5fbf
SHA1eacf4b82e080c80d1bd121bcdfc35c52a28b4f0e
SHA256a62751453618735964f32c88d8dbf08d5e27d17b3109a2bb48a15f4ad661a372
SHA512b4f2d8339309b6c742eb4b9027b4486b1b2dafa28c0287bd8a28df9265df7cab2dd7542e263faccc20992e8d6b89f293bae7728efb16961697706976c028e1d1
-
Filesize
32KB
MD562714a724abbfc87f6d3e46a446d5fbf
SHA1eacf4b82e080c80d1bd121bcdfc35c52a28b4f0e
SHA256a62751453618735964f32c88d8dbf08d5e27d17b3109a2bb48a15f4ad661a372
SHA512b4f2d8339309b6c742eb4b9027b4486b1b2dafa28c0287bd8a28df9265df7cab2dd7542e263faccc20992e8d6b89f293bae7728efb16961697706976c028e1d1