Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe
Resource
win10v2004-20221111-en
General
-
Target
74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe
-
Size
181KB
-
MD5
7d3b5e0524975e9cf9063cc53eb13e4d
-
SHA1
15790c2428c14fcf753fbb3d08eaa44b0752b7c3
-
SHA256
74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8
-
SHA512
d5dd8c5109e0fbd6a81883d6767f862b6a0f3a7608b5c0685ff989b18cf5499286404d81cc8135141880051cb50c9151740ddcc2be4dbf0564417561c4c1e5f6
-
SSDEEP
3072:4faI9mPig4XjzI7CVACmjmliW1AEyd7pqVvLDPbL5OeL4QwHCAtLbtYQSe4:45ETAj7Ahgj1RY7pqbL5OnFiO3we4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1292 nakas.exe -
Deletes itself 1 IoCs
pid Process 1924 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run nakas.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run nakas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ulsudiymmu = "C:\\Users\\Admin\\AppData\\Roaming\\Evik\\nakas.exe" nakas.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1908 set thread context of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\44E66441-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe 1292 nakas.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe Token: SeSecurityPrivilege 1924 cmd.exe Token: SeSecurityPrivilege 1924 cmd.exe Token: SeSecurityPrivilege 1924 cmd.exe Token: SeSecurityPrivilege 1924 cmd.exe Token: SeSecurityPrivilege 1924 cmd.exe Token: SeManageVolumePrivilege 1568 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1568 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1568 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1292 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 28 PID 1908 wrote to memory of 1292 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 28 PID 1908 wrote to memory of 1292 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 28 PID 1908 wrote to memory of 1292 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 28 PID 1292 wrote to memory of 1120 1292 nakas.exe 10 PID 1292 wrote to memory of 1120 1292 nakas.exe 10 PID 1292 wrote to memory of 1120 1292 nakas.exe 10 PID 1292 wrote to memory of 1120 1292 nakas.exe 10 PID 1292 wrote to memory of 1120 1292 nakas.exe 10 PID 1292 wrote to memory of 1164 1292 nakas.exe 18 PID 1292 wrote to memory of 1164 1292 nakas.exe 18 PID 1292 wrote to memory of 1164 1292 nakas.exe 18 PID 1292 wrote to memory of 1164 1292 nakas.exe 18 PID 1292 wrote to memory of 1164 1292 nakas.exe 18 PID 1292 wrote to memory of 1196 1292 nakas.exe 17 PID 1292 wrote to memory of 1196 1292 nakas.exe 17 PID 1292 wrote to memory of 1196 1292 nakas.exe 17 PID 1292 wrote to memory of 1196 1292 nakas.exe 17 PID 1292 wrote to memory of 1196 1292 nakas.exe 17 PID 1292 wrote to memory of 1908 1292 nakas.exe 27 PID 1292 wrote to memory of 1908 1292 nakas.exe 27 PID 1292 wrote to memory of 1908 1292 nakas.exe 27 PID 1292 wrote to memory of 1908 1292 nakas.exe 27 PID 1292 wrote to memory of 1908 1292 nakas.exe 27 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1908 wrote to memory of 1924 1908 74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe 29 PID 1292 wrote to memory of 1668 1292 nakas.exe 30 PID 1292 wrote to memory of 1668 1292 nakas.exe 30 PID 1292 wrote to memory of 1668 1292 nakas.exe 30 PID 1292 wrote to memory of 1668 1292 nakas.exe 30 PID 1292 wrote to memory of 1668 1292 nakas.exe 30 PID 1292 wrote to memory of 1936 1292 nakas.exe 31 PID 1292 wrote to memory of 1936 1292 nakas.exe 31 PID 1292 wrote to memory of 1936 1292 nakas.exe 31 PID 1292 wrote to memory of 1936 1292 nakas.exe 31 PID 1292 wrote to memory of 1936 1292 nakas.exe 31 PID 1292 wrote to memory of 1568 1292 nakas.exe 32 PID 1292 wrote to memory of 1568 1292 nakas.exe 32 PID 1292 wrote to memory of 1568 1292 nakas.exe 32 PID 1292 wrote to memory of 1568 1292 nakas.exe 32 PID 1292 wrote to memory of 1568 1292 nakas.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe"C:\Users\Admin\AppData\Local\Temp\74672a8a67b9a66733696a096ff95645836642354a5e6315754c86d1408ef8f8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\Evik\nakas.exe"C:\Users\Admin\AppData\Roaming\Evik\nakas.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp38fa0fef.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "525894199-8784050752104368582354203914-2135414366-482009578-1575706309406367765"1⤵PID:1936
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d793bf7010dac9cb439956e3f698c4a9
SHA174c415fb304128b8742cd9a40f07611ab818ad6b
SHA25603c222476df04d0ffe064cc06ec35dda8843eb07172f0e31abc71fb6c3cc3585
SHA512da45d03b48c46cde4af28be202ecb18937a0ffda4285f650c0a4c9e0f62d409f1dbbba39741610d3248765cde4710beac756ba88dde72af5651716c0b8ff437e
-
Filesize
181KB
MD5a9bda2b0e4c35a3ce502d3796cc5e473
SHA1d21efb34903116d2bb726f793bd58a104d9a7e4d
SHA256e406e7ca2a06aa440a8f44c96f8089ff88440e460845ec7215cfbea397ba832b
SHA5120ecff5a4c31b1d20028b2ebee9abee95ca27e5bcddb2d3416ca1d5265b1e446003446ad27abac282df37a65d17b83d56a73d493dc9e045fcc94d776f96215a4a
-
Filesize
181KB
MD5a9bda2b0e4c35a3ce502d3796cc5e473
SHA1d21efb34903116d2bb726f793bd58a104d9a7e4d
SHA256e406e7ca2a06aa440a8f44c96f8089ff88440e460845ec7215cfbea397ba832b
SHA5120ecff5a4c31b1d20028b2ebee9abee95ca27e5bcddb2d3416ca1d5265b1e446003446ad27abac282df37a65d17b83d56a73d493dc9e045fcc94d776f96215a4a
-
Filesize
3KB
MD561fed7d63cd71abc535085b152560c1b
SHA1e7ac2d1a1a664c6047b849a7aa21590808e6ce82
SHA256192f22d7ba136abe6b3750e5b942b18a33fa44666ff1a03e4afc2501944b9ac3
SHA5122cf13fe9a2addf6289f0d27f3d0103e525b17ee032392d54d0a9fc158844e2a5f2a697d322179ce3ef9a7699ad5b17ebd91bb27e19ffd9e9a82393ea339c2eb7
-
Filesize
4KB
MD550a85316ffa6ca41ee79ce233934da8f
SHA179525226cfdb24b581b92c790bc6cbe11b17b5c4
SHA256e801d66bfd5cf2bc417ed162e78185e0d8bafcdccfa7a905e8dbd1a054724970
SHA5126f0db7ab81b1d4646f28faa69af7ae1a7f62af3573bf5685543bb766d1a83a83ed8adb2de88ae0dc428bf54bd81654b9b6d40fbbe3d531bee8bb5fdfcfbb2355
-
Filesize
181KB
MD5a9bda2b0e4c35a3ce502d3796cc5e473
SHA1d21efb34903116d2bb726f793bd58a104d9a7e4d
SHA256e406e7ca2a06aa440a8f44c96f8089ff88440e460845ec7215cfbea397ba832b
SHA5120ecff5a4c31b1d20028b2ebee9abee95ca27e5bcddb2d3416ca1d5265b1e446003446ad27abac282df37a65d17b83d56a73d493dc9e045fcc94d776f96215a4a
-
Filesize
181KB
MD5a9bda2b0e4c35a3ce502d3796cc5e473
SHA1d21efb34903116d2bb726f793bd58a104d9a7e4d
SHA256e406e7ca2a06aa440a8f44c96f8089ff88440e460845ec7215cfbea397ba832b
SHA5120ecff5a4c31b1d20028b2ebee9abee95ca27e5bcddb2d3416ca1d5265b1e446003446ad27abac282df37a65d17b83d56a73d493dc9e045fcc94d776f96215a4a