Resubmissions
13-02-2023 17:02
230213-vkeyqsea7s 10Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 17:02
Static task
static1
Behavioral task
behavioral1
Sample
nvidia_win64_n1wp7ux1va.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
nvidia_win64_n1wp7ux1va.exe
-
Size
270.4MB
-
MD5
340c6577104ffaa3f46abc51ce55018a
-
SHA1
8c7799428a45282dfafd342eaed5a78658915e8d
-
SHA256
8fb273ba752804302bb87573a297953beabe4c99c05d21c7cb4825d9fff3cd0a
-
SHA512
0be0d5896a77cbf6abd53fe0d98a5b0bbe2b9735e2f0f073fcf318e351f2b3ff644974936b734230a9245c420b73e3e72e8541ed18c10f6fe900c99094304f80
-
SSDEEP
24576:SnjHnThJPWqliJ/y0A5RC5gxRJ3dCeiS3Lsy1xAyulQbgYNGErplM1SHg3bHWrKS:KjHnThJuqS/y0cCNgk+lKoEC9z1
Malware Config
Extracted
Family
aurora
C2
45.15.156.210:8081
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
nvidia_win64_n1wp7ux1va.exedescription pid process target process PID 1356 set thread context of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe -
Processes:
nvidia_win64_n1wp7ux1va.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 nvidia_win64_n1wp7ux1va.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 nvidia_win64_n1wp7ux1va.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 1592 wmic.exe Token: SeSecurityPrivilege 1592 wmic.exe Token: SeTakeOwnershipPrivilege 1592 wmic.exe Token: SeLoadDriverPrivilege 1592 wmic.exe Token: SeSystemProfilePrivilege 1592 wmic.exe Token: SeSystemtimePrivilege 1592 wmic.exe Token: SeProfSingleProcessPrivilege 1592 wmic.exe Token: SeIncBasePriorityPrivilege 1592 wmic.exe Token: SeCreatePagefilePrivilege 1592 wmic.exe Token: SeBackupPrivilege 1592 wmic.exe Token: SeRestorePrivilege 1592 wmic.exe Token: SeShutdownPrivilege 1592 wmic.exe Token: SeDebugPrivilege 1592 wmic.exe Token: SeSystemEnvironmentPrivilege 1592 wmic.exe Token: SeRemoteShutdownPrivilege 1592 wmic.exe Token: SeUndockPrivilege 1592 wmic.exe Token: SeManageVolumePrivilege 1592 wmic.exe Token: 33 1592 wmic.exe Token: 34 1592 wmic.exe Token: 35 1592 wmic.exe Token: SeIncreaseQuotaPrivilege 1592 wmic.exe Token: SeSecurityPrivilege 1592 wmic.exe Token: SeTakeOwnershipPrivilege 1592 wmic.exe Token: SeLoadDriverPrivilege 1592 wmic.exe Token: SeSystemProfilePrivilege 1592 wmic.exe Token: SeSystemtimePrivilege 1592 wmic.exe Token: SeProfSingleProcessPrivilege 1592 wmic.exe Token: SeIncBasePriorityPrivilege 1592 wmic.exe Token: SeCreatePagefilePrivilege 1592 wmic.exe Token: SeBackupPrivilege 1592 wmic.exe Token: SeRestorePrivilege 1592 wmic.exe Token: SeShutdownPrivilege 1592 wmic.exe Token: SeDebugPrivilege 1592 wmic.exe Token: SeSystemEnvironmentPrivilege 1592 wmic.exe Token: SeRemoteShutdownPrivilege 1592 wmic.exe Token: SeUndockPrivilege 1592 wmic.exe Token: SeManageVolumePrivilege 1592 wmic.exe Token: 33 1592 wmic.exe Token: 34 1592 wmic.exe Token: 35 1592 wmic.exe Token: SeIncreaseQuotaPrivilege 1796 WMIC.exe Token: SeSecurityPrivilege 1796 WMIC.exe Token: SeTakeOwnershipPrivilege 1796 WMIC.exe Token: SeLoadDriverPrivilege 1796 WMIC.exe Token: SeSystemProfilePrivilege 1796 WMIC.exe Token: SeSystemtimePrivilege 1796 WMIC.exe Token: SeProfSingleProcessPrivilege 1796 WMIC.exe Token: SeIncBasePriorityPrivilege 1796 WMIC.exe Token: SeCreatePagefilePrivilege 1796 WMIC.exe Token: SeBackupPrivilege 1796 WMIC.exe Token: SeRestorePrivilege 1796 WMIC.exe Token: SeShutdownPrivilege 1796 WMIC.exe Token: SeDebugPrivilege 1796 WMIC.exe Token: SeSystemEnvironmentPrivilege 1796 WMIC.exe Token: SeRemoteShutdownPrivilege 1796 WMIC.exe Token: SeUndockPrivilege 1796 WMIC.exe Token: SeManageVolumePrivilege 1796 WMIC.exe Token: 33 1796 WMIC.exe Token: 34 1796 WMIC.exe Token: 35 1796 WMIC.exe Token: SeIncreaseQuotaPrivilege 1796 WMIC.exe Token: SeSecurityPrivilege 1796 WMIC.exe Token: SeTakeOwnershipPrivilege 1796 WMIC.exe Token: SeLoadDriverPrivilege 1796 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
nvidia_win64_n1wp7ux1va.exenvidia_win64_n1wp7ux1va.execmd.execmd.exedescription pid process target process PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 1356 wrote to memory of 916 1356 nvidia_win64_n1wp7ux1va.exe nvidia_win64_n1wp7ux1va.exe PID 916 wrote to memory of 1592 916 nvidia_win64_n1wp7ux1va.exe wmic.exe PID 916 wrote to memory of 1592 916 nvidia_win64_n1wp7ux1va.exe wmic.exe PID 916 wrote to memory of 1592 916 nvidia_win64_n1wp7ux1va.exe wmic.exe PID 916 wrote to memory of 588 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 916 wrote to memory of 588 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 916 wrote to memory of 588 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 588 wrote to memory of 1796 588 cmd.exe WMIC.exe PID 588 wrote to memory of 1796 588 cmd.exe WMIC.exe PID 588 wrote to memory of 1796 588 cmd.exe WMIC.exe PID 916 wrote to memory of 1048 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 916 wrote to memory of 1048 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 916 wrote to memory of 1048 916 nvidia_win64_n1wp7ux1va.exe cmd.exe PID 1048 wrote to memory of 1524 1048 cmd.exe WMIC.exe PID 1048 wrote to memory of 1524 1048 cmd.exe WMIC.exe PID 1048 wrote to memory of 1524 1048 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nvidia_win64_n1wp7ux1va.exe"C:\Users\Admin\AppData\Local\Temp\nvidia_win64_n1wp7ux1va.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\nvidia_win64_n1wp7ux1va.exe"C:\Users\Admin\AppData\Local\Temp\nvidia_win64_n1wp7ux1va.exe"2⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\System32\Wbem\wmic.exewmic os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"3⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name4⤵PID:1524