Analysis
-
max time kernel
13s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 17:20
Behavioral task
behavioral1
Sample
nagogy-Client.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
nagogy-Client.exe
-
Size
78KB
-
MD5
803ad51b4586f5530e8ca1f5fa4cd553
-
SHA1
7b91157fbe1024a112138e1b7289245ef6328d7b
-
SHA256
27344c4f8d158cd042ac629d786df927ed576ca45f1b9f0b5df38376c3c34fd5
-
SHA512
22a8db1e7b5b1f2044a3b78db8b1bc56f2fe9400d3484f4fe43c431fec22684a300a59eb906c8109ec99775b606130649695d8857bb85512206c75ab8cd01b3f
-
SSDEEP
1536:HjAe+iKGODpSS5wpOk3JCK6pFoS/m6fOpd/9nEh9TG4dfR:nQwpOk5CK61O/9ES4df
Score
1/10
Malware Config
Signatures
-
Kills process with taskkill 2 IoCs
Processes:
TASKKILL.exeTASKKILL.exepid process 4840 TASKKILL.exe 1052 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
nagogy-Client.exepid process 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe 4176 nagogy-Client.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
nagogy-Client.exeTASKKILL.exeTASKKILL.exedescription pid process Token: SeDebugPrivilege 4176 nagogy-Client.exe Token: SeDebugPrivilege 4840 TASKKILL.exe Token: SeDebugPrivilege 1052 TASKKILL.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
nagogy-Client.exedescription pid process target process PID 4176 wrote to memory of 4840 4176 nagogy-Client.exe TASKKILL.exe PID 4176 wrote to memory of 4840 4176 nagogy-Client.exe TASKKILL.exe PID 4176 wrote to memory of 4840 4176 nagogy-Client.exe TASKKILL.exe PID 4176 wrote to memory of 1052 4176 nagogy-Client.exe TASKKILL.exe PID 4176 wrote to memory of 1052 4176 nagogy-Client.exe TASKKILL.exe PID 4176 wrote to memory of 1052 4176 nagogy-Client.exe TASKKILL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe"C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4176-133-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-134-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-135-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-136-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-137-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-138-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-139-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-140-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-141-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-142-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-143-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-144-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-145-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-146-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-147-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-148-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB
-
memory/4176-149-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/4176-150-0x0000000006A50000-0x0000000006B50000-memory.dmpFilesize
1024KB