Overview
overview
3Static
static
1NitroxLauncher.exe
windows7-x64
3NitroxLauncher.exe
windows10-2004-x64
1NitroxLaun...xe.xml
windows7-x64
1NitroxLaun...xe.xml
windows10-2004-x64
1NitroxServ...ca.exe
windows7-x64
1NitroxServ...ca.exe
windows10-2004-x64
1NitroxServ...xe.xml
windows7-x64
1NitroxServ...xe.xml
windows10-2004-x64
1lib/0Harmony.dll
windows7-x64
1lib/0Harmony.dll
windows10-2004-x64
1lib/Assets...ET.dll
windows7-x64
1lib/Assets...ET.dll
windows10-2004-x64
1lib/Autofac.dll
windows7-x64
1lib/Autofac.dll
windows10-2004-x64
1lib/BinaryPack.dll
windows7-x64
1lib/BinaryPack.dll
windows10-2004-x64
1lib/Discor...er.dll
windows7-x64
1lib/Discor...er.dll
windows10-2004-x64
1lib/JetBra...ns.dll
windows7-x64
1lib/JetBra...ns.dll
windows10-2004-x64
1lib/LZ4.dll
windows7-x64
1lib/LZ4.dll
windows10-2004-x64
1lib/LitJSON.dll
windows7-x64
1lib/LitJSON.dll
windows10-2004-x64
1lib/LiteNetLib.dll
windows7-x64
1lib/LiteNetLib.dll
windows10-2004-x64
1lib/Micros...ry.dll
windows7-x64
1lib/Micros...ry.dll
windows10-2004-x64
1lib/Micros...ll.dll
windows7-x64
1lib/Micros...ll.dll
windows10-2004-x64
1lib/Micros...ck.dll
windows7-x64
1lib/Micros...ck.dll
windows10-2004-x64
1Analysis
-
max time kernel
414s -
max time network
417s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 05:16
Static task
static1
Behavioral task
behavioral1
Sample
NitroxLauncher.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NitroxLauncher.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
NitroxLauncher.exe.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
NitroxLauncher.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
NitroxServer-Subnautica.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
NitroxServer-Subnautica.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
NitroxServer-Subnautica.exe.xml
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
NitroxServer-Subnautica.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
lib/0Harmony.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
lib/0Harmony.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
lib/AssetsTools.NET.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
lib/AssetsTools.NET.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
lib/Autofac.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
lib/Autofac.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
lib/BinaryPack.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
lib/BinaryPack.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
lib/DiscordGameSDKWrapper.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
lib/DiscordGameSDKWrapper.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
lib/JetBrains.Annotations.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
lib/JetBrains.Annotations.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
lib/LZ4.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
lib/LZ4.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
lib/LitJSON.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
lib/LitJSON.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
lib/LiteNetLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
lib/LiteNetLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
lib/Microsoft.Win32.Registry.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
lib/Microsoft.Win32.Registry.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral29
Sample
lib/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
lib/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
lib/Microsoft.WindowsAPICodePack.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
lib/Microsoft.WindowsAPICodePack.dll
Resource
win10v2004-20230220-en
General
-
Target
NitroxServer-Subnautica.exe.xml
-
Size
1011B
-
MD5
5258b3e435706e2d5bf1374853e84d11
-
SHA1
6275d78bfa1995151953593e0c1bff3b1ad05bc4
-
SHA256
29b6339edcb982893d7d94c3e5fe15e3d1af72e45ac0525e31bab7f85a878564
-
SHA512
ba596623d108c0cd7125e8fd0cadd32d017c6ab611bbd8318dff83d09b3f584e04e97f11d3be03fa48a4df424260f646e56e66075791aa9d2cbbf9953c0686ee
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386317202" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f0fa2d4f5dd901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5631A501-C942-11ED-B883-CED2106B5FC8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e20000000002000000000010660000000100002000000055d8ec0cf1d4863c3374b94b809e0a928d9a3129a185c6ac5bff52a951f39ef0000000000e800000000200002000000015a47b8a9ee16ed786c45f27d51959baa65911e06fca950f0cbf5471658615b720000000eedfaa1345ce788bee3637d229b757e40c441219f12a61d4ac6d4bd4c3f4950540000000d6aa48d95841fc2b30d58011b22e9a55186a75fb4bd175bdf2a91c5e3923e13e9045d36bdddf5ea8de03827a1adc190b5660334648eab5925c3ea44fb1f3e64b IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 752 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 752 IEXPLORE.EXE 752 IEXPLORE.EXE 568 IEXPLORE.EXE 568 IEXPLORE.EXE 568 IEXPLORE.EXE 568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1952 wrote to memory of 436 1952 MSOXMLED.EXE 29 PID 1952 wrote to memory of 436 1952 MSOXMLED.EXE 29 PID 1952 wrote to memory of 436 1952 MSOXMLED.EXE 29 PID 1952 wrote to memory of 436 1952 MSOXMLED.EXE 29 PID 436 wrote to memory of 752 436 iexplore.exe 30 PID 436 wrote to memory of 752 436 iexplore.exe 30 PID 436 wrote to memory of 752 436 iexplore.exe 30 PID 436 wrote to memory of 752 436 iexplore.exe 30 PID 752 wrote to memory of 568 752 IEXPLORE.EXE 31 PID 752 wrote to memory of 568 752 IEXPLORE.EXE 31 PID 752 wrote to memory of 568 752 IEXPLORE.EXE 31 PID 752 wrote to memory of 568 752 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\NitroxServer-Subnautica.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:752 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:568
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e933f37b23c0ab53b029571c0f34b9
SHA1bfcb26a5973f503c2a0b0675f86b02c83ac02cba
SHA256f62d830a0d47bb015c0329b89a77c748f908c23cc29b60b11785d6162735ec12
SHA512b8ffb8bbbaf2da397bb39813e2d0a3a4b59f93b09b74d340cfa6551e3ce08c67f57fa7935e05ffc50325eab6daa99360e9ecec2a396fa9e347fe99d97a1557f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea43e11bbaad609578e8e11d6fdfe314
SHA141ab26a2f5713a2a7e657a504f3e7c0363c69a3e
SHA25693a47906f617c56c66b332b2b3f7fc53cc50a9b0e8dfa7caa91c50a7d62343ca
SHA512d07ed94cf3ac37da787eb88a919c089ac945826121edb87832a3a4bdfefe185cefe256d66df1590b3ebc94ec03041d424d1887106905d63182daceaa6a51a7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b261ac3c118d7a2b20cecc291f65d90
SHA1a7b455b4666d10ec849e5c8f73a4b0e0fa905b61
SHA256796f18e61e00e77d8d586a6567563745754d636cc117a3afbcef49e448495b5e
SHA51209d964543a0668b9b05bc73576c9bbca07b3e69129be8cac354cea865cbd9427d8aaef278ebf9bfdc20c3239015815403b8f8d65c9515d4e14d857e841e61fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d128412623b1b243fcc6fdd3eedb890c
SHA154833bb80f7b1439293d398b103709a0c58e9e19
SHA256400511c2f1f54d9045c674d0501626248ab39af4eba1292601c06bd5fc6970bf
SHA512dba627aba32df6bf7392572963b4c9f4c919ade6e56fc9bfcf87e56096df18b7f4a9d0bad6850af685b61aeec4c44dd4de1aa051ebb01c80b459e6fc66e471b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0f7619c42789bb756a767130569bd3
SHA1c67661a6c9a6cd50dbfc49cb4b69fedbb441fd9d
SHA25676ddd983e66c02daeb9cf7413e9edf9d66831c0dbf1ddd5da06ca48101d1f68e
SHA512b2e66edf61aafaf725948c68a11fca26a47a216e52e586218d0dab0cd70d5699f8b735104ac7555b7574c46f7421c842e7fe1a97ee08207194c7ae3918ab12da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bda999068decc5867ffcbbcb288be1
SHA1b016b72a5099b41b1ba79cc45d75e89b17ec3702
SHA2561ee0a85fc4da6f70cd16e4e26dcde0529b175d5afe01a605a5be75c234121bc4
SHA51265dd048a60e89df6e5f779cb9e993e416b1fe094f7528a7d88b489467667553872fa8d0f78c71afe3a408386faf4f7f729b3aaf775779cf527fce468cbbbd727
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
606B
MD5c6d487b374ffc54e73f07281e41378d3
SHA1b0cc81bead90116b2cb87ed6659219052003c238
SHA256c8fa0f6fef2b7dd57f2867e919e89c9ccf104b0d762746b1edac14cf6e9a6793
SHA512152fb942b2762e63afb74ca5e1c1e20b9b91b7157ff166a99b186d8bdd3f19b26fbd506ad4d4cb702a84b608fe58953884cc6e3ca77af52519932607be4f83e7