Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 08:50

General

  • Target

    NicoDrip.exe

  • Size

    16KB

  • MD5

    0e4e1025f15cb4bebf089082a2b0f4ee

  • SHA1

    7a5a58d78878e884ff460a03f43eef159f616e26

  • SHA256

    fc0f113025efd6601036a286bd27855f0afcd26bce4a0207ad83c9e7d0e360fd

  • SHA512

    18070688eca00a769436ea7f5e4fae603dd76bb5f3b7350ffa067a2bc46f6146fc6a4bbaf39fa257a7b8c5d87698b05d7352e082e0054d36f80194eeda12b309

  • SSDEEP

    384:mDuI8XU1nFqpInHmbMKJNa65C4fjVI5GAWaew:iu9MnFPnHCpfakaew

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NicoDrip.exe
    "C:\Users\Admin\AppData\Local\Temp\NicoDrip.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    PID:2804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2804-132-0x000001C2B41E0000-0x000001C2B41EA000-memory.dmp

    Filesize

    40KB

  • memory/2804-133-0x00007FF8611F0000-0x00007FF861CB1000-memory.dmp

    Filesize

    10.8MB

  • memory/2804-134-0x00007FF8611F0000-0x00007FF861CB1000-memory.dmp

    Filesize

    10.8MB