Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
NicoDrip.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NicoDrip.exe
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
NicoDrip.exe
-
Size
16KB
-
MD5
0e4e1025f15cb4bebf089082a2b0f4ee
-
SHA1
7a5a58d78878e884ff460a03f43eef159f616e26
-
SHA256
fc0f113025efd6601036a286bd27855f0afcd26bce4a0207ad83c9e7d0e360fd
-
SHA512
18070688eca00a769436ea7f5e4fae603dd76bb5f3b7350ffa067a2bc46f6146fc6a4bbaf39fa257a7b8c5d87698b05d7352e082e0054d36f80194eeda12b309
-
SSDEEP
384:mDuI8XU1nFqpInHmbMKJNa65C4fjVI5GAWaew:iu9MnFPnHCpfakaew
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdater.lnk NicoDrip.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NicoDrip.exe\" .." NicoDrip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.