Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe
Resource
win10v2004-20220812-en
General
-
Target
c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe
-
Size
176KB
-
MD5
b17831dd8a3bd3b973b04222635590a4
-
SHA1
ca8cde2be731517d27f87d198d3392a997168735
-
SHA256
c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1
-
SHA512
3ba7d802705526bfbb1096bfe936a12a627e18490df1a3700bca947f393ac327f9ca6ba030b3b54330348d94c6f3307f997606454805b36ecb711ad7cb3ade87
-
SSDEEP
3072:5taGK/fObT/bGiS3LOClnkZQxlrUax81zX1faK0U9C00hKex9nQ3b7a5VpIC+RZL:5t1K/fObT/bGiELOSnkZQxlrUax8NX1t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nrmeit.exe -
Executes dropped EXE 1 IoCs
pid Process 1428 nrmeit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /H" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /O" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /B" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /L" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /g" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /y" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /l" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /R" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /W" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /b" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /f" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /c" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /F" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /Z" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /G" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /T" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /x" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /t" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /U" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /n" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /N" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /k" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /i" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /v" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /h" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /r" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /m" nrmeit.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /M" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /d" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /P" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /K" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /j" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /J" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /e" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /z" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /Y" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /I" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /q" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /S" nrmeit.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /E" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /X" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /s" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /o" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /C" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /h" c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /Q" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /w" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /A" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /a" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /p" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /u" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /D" nrmeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nrmeit = "C:\\Users\\Admin\\nrmeit.exe /V" nrmeit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe 1428 nrmeit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 1428 nrmeit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1428 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 81 PID 1868 wrote to memory of 1428 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 81 PID 1868 wrote to memory of 1428 1868 c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe"C:\Users\Admin\AppData\Local\Temp\c5b37b72e1639be066bd76c54918db322c122513dfd9477ca297be896ceb89f1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\nrmeit.exe"C:\Users\Admin\nrmeit.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56eb00541cec171c2011eda2c4ba6feac
SHA1a100990893a73ec668190c2d09c4da7d0e9f1369
SHA2561481418b627ff4e908e1f15fcb77d079080dd99fee3d7f545683492d84d4661a
SHA5128b73ddd1515b05b3c31e10d3e8475bfdce60dd4f73f7edeb75b5edb5010d0aaf38f22dd831ff442f374e2699ce7081eefcd3312dcabd99df22aefa76a375f4ce
-
Filesize
176KB
MD56eb00541cec171c2011eda2c4ba6feac
SHA1a100990893a73ec668190c2d09c4da7d0e9f1369
SHA2561481418b627ff4e908e1f15fcb77d079080dd99fee3d7f545683492d84d4661a
SHA5128b73ddd1515b05b3c31e10d3e8475bfdce60dd4f73f7edeb75b5edb5010d0aaf38f22dd831ff442f374e2699ce7081eefcd3312dcabd99df22aefa76a375f4ce