Analysis

  • max time kernel
    84s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2023, 07:54

General

  • Target

    9e5791184f17947a8c5de18f0b531621.exe

  • Size

    330KB

  • MD5

    9e5791184f17947a8c5de18f0b531621

  • SHA1

    7ea57de458298e629ee3ece0e835a482a328623e

  • SHA256

    3c2d75bb161819f1eb3a289d45e1efafff664df94e23e12cc1d5fde2135ae75c

  • SHA512

    8bea91539bb0169d538bb4898c4b2eadc815af960f8f7a67143fa153f3a29ace0b68c44ba62ec84d9cccca7221ba0c9e4d7bb56af01d28ce8e5e45221b8cc8a0

  • SSDEEP

    6144:k9qZLYKY3lTIraQxpFevGrS5/dDQTbNV4b7i:k9qZUKQFIrTxpFgGrS/dkTbv4bu

Score
10/10

Malware Config

Extracted

Family

nymaim

C2

45.139.105.171

85.31.46.167

Signatures

  • NyMaim

    NyMaim is a malware with various capabilities written in C++ and first seen in 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 10 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e5791184f17947a8c5de18f0b531621.exe
    "C:\Users\Admin\AppData\Local\Temp\9e5791184f17947a8c5de18f0b531621.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 456
      2⤵
      • Program crash
      PID:3544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 764
      2⤵
      • Program crash
      PID:372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 784
      2⤵
      • Program crash
      PID:1768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 784
      2⤵
      • Program crash
      PID:4400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 856
      2⤵
      • Program crash
      PID:3068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 876
      2⤵
      • Program crash
      PID:260
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 836
      2⤵
      • Program crash
      PID:4804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 1084
      2⤵
      • Program crash
      PID:1840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 1360
      2⤵
      • Program crash
      PID:3768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im "9e5791184f17947a8c5de18f0b531621.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9e5791184f17947a8c5de18f0b531621.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "9e5791184f17947a8c5de18f0b531621.exe" /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 512
      2⤵
      • Program crash
      PID:3088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4628 -ip 4628
    1⤵
      PID:456
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4628 -ip 4628
      1⤵
        PID:652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4628 -ip 4628
        1⤵
          PID:1836
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4628 -ip 4628
          1⤵
            PID:856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4628 -ip 4628
            1⤵
              PID:1704
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4628 -ip 4628
              1⤵
                PID:4264
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4628 -ip 4628
                1⤵
                  PID:3948
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4628 -ip 4628
                  1⤵
                    PID:5052
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4628 -ip 4628
                    1⤵
                      PID:4456
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4628 -ip 4628
                      1⤵
                        PID:996

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/4628-132-0x00000000007FE000-0x0000000000825000-memory.dmp

                        Filesize

                        156KB

                      • memory/4628-133-0x00000000021C0000-0x0000000002200000-memory.dmp

                        Filesize

                        256KB

                      • memory/4628-134-0x0000000000400000-0x000000000046F000-memory.dmp

                        Filesize

                        444KB

                      • memory/4628-137-0x00000000007FE000-0x0000000000825000-memory.dmp

                        Filesize

                        156KB

                      • memory/4628-138-0x00000000021C0000-0x0000000002200000-memory.dmp

                        Filesize

                        256KB

                      • memory/4628-139-0x0000000000400000-0x000000000046F000-memory.dmp

                        Filesize

                        444KB