Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe
Resource
win10v2004-20221111-en
General
-
Target
828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe
-
Size
184KB
-
MD5
7cb5ba49428f8bc264712b75bc2943d2
-
SHA1
7e47af74528ac0b3a2c0f3ca42c5945a3c067050
-
SHA256
828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a
-
SHA512
43e2219803225ef9476c999380e6be70c864a4e1f06a008f36865c7883f4c9b617847c23c3342dc6d623d7124ce4f80c50b25065f4c84755152c71cd0e8e8b49
-
SSDEEP
3072:2ZZJz0/29lYqldrXAHDnP8jmvZMy1Jy3b33akhGudahvyMjy5cI8dZLYVjg:Uh0/29tZ0P8jmBry3L9oYVs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niacud.exe -
Executes dropped EXE 1 IoCs
pid Process 1388 niacud.exe -
Loads dropped DLL 2 IoCs
pid Process 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /p" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /v" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /r" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /o" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /q" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /t" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /m" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /x" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /s" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /f" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /u" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /j" niacud.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /y" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /e" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /w" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /a" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /l" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /g" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /n" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /c" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /z" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /h" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /l" 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /d" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /i" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /k" niacud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\niacud = "C:\\Users\\Admin\\niacud.exe /b" niacud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe 1388 niacud.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 1388 niacud.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1388 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 28 PID 1920 wrote to memory of 1388 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 28 PID 1920 wrote to memory of 1388 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 28 PID 1920 wrote to memory of 1388 1920 828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe"C:\Users\Admin\AppData\Local\Temp\828c0464e39c8e1f5d1b67d42502252db0d160b10d3ecf8af48d3a9874e48e5a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\niacud.exe"C:\Users\Admin\niacud.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5126754266f71156a323194319d3db329
SHA10e4459ad7fb8cd68a5fcb7f7bb75e60901e46721
SHA25668ae62c9e55ba3b94db8179e6cde04e22c3b85abe1e2e75338bee689855da31d
SHA5123ef40c5c1399722af35f711079d325d908325fee09f76978d050ea1c9750a17ead185c84cc6312a2ecf0efc13d1494a78c9a9bf2bfa3fbab3b6dfd9b2af10f86
-
Filesize
184KB
MD5126754266f71156a323194319d3db329
SHA10e4459ad7fb8cd68a5fcb7f7bb75e60901e46721
SHA25668ae62c9e55ba3b94db8179e6cde04e22c3b85abe1e2e75338bee689855da31d
SHA5123ef40c5c1399722af35f711079d325d908325fee09f76978d050ea1c9750a17ead185c84cc6312a2ecf0efc13d1494a78c9a9bf2bfa3fbab3b6dfd9b2af10f86
-
Filesize
184KB
MD5126754266f71156a323194319d3db329
SHA10e4459ad7fb8cd68a5fcb7f7bb75e60901e46721
SHA25668ae62c9e55ba3b94db8179e6cde04e22c3b85abe1e2e75338bee689855da31d
SHA5123ef40c5c1399722af35f711079d325d908325fee09f76978d050ea1c9750a17ead185c84cc6312a2ecf0efc13d1494a78c9a9bf2bfa3fbab3b6dfd9b2af10f86
-
Filesize
184KB
MD5126754266f71156a323194319d3db329
SHA10e4459ad7fb8cd68a5fcb7f7bb75e60901e46721
SHA25668ae62c9e55ba3b94db8179e6cde04e22c3b85abe1e2e75338bee689855da31d
SHA5123ef40c5c1399722af35f711079d325d908325fee09f76978d050ea1c9750a17ead185c84cc6312a2ecf0efc13d1494a78c9a9bf2bfa3fbab3b6dfd9b2af10f86