Analysis
-
max time kernel
16s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-02-2023 17:29
Behavioral task
behavioral1
Sample
nimrod3k_beta.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
nimrod3k_beta.exe
Resource
win10v2004-20221111-en
General
-
Target
nimrod3k_beta.exe
-
Size
113.7MB
-
MD5
3ad89fefa1ad157633127240c3391ea0
-
SHA1
a782cd2f64d83a427a1f3518ccf0ecb318dc1494
-
SHA256
e3b0ab45f40a99bcfec631868debf25f8736fe7409579fc53ecad859571ac721
-
SHA512
1daacfcfc7d93d7fc9c730abc7bd6220f3585502af74add7f32713bda4f199666f2705ead4efb63b686cbce5ed5b65223b013c26930c678b5c128756b1842f52
-
SSDEEP
3145728:/F7V7SC++pLwANp7y4NT/LjBCVpOmo8sLOEc+:pVWCXPjrBc0mMOE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
nimrod3k_beta.exepid process 1336 nimrod3k_beta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
nimrod3k_beta.exedescription pid process target process PID 2004 wrote to memory of 1336 2004 nimrod3k_beta.exe nimrod3k_beta.exe PID 2004 wrote to memory of 1336 2004 nimrod3k_beta.exe nimrod3k_beta.exe PID 2004 wrote to memory of 1336 2004 nimrod3k_beta.exe nimrod3k_beta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nimrod3k_beta.exe"C:\Users\Admin\AppData\Local\Temp\nimrod3k_beta.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\nimrod3k_beta.exe"C:\Users\Admin\AppData\Local\Temp\nimrod3k_beta.exe"2⤵
- Loads dropped DLL
PID:1336
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b