Overview
overview
10Static
static
10nagogy-Client.exe
windows10-1703-x64
10nagogy-Client.exe
windows7-x64
1nagogy-Client.exe
windows10-2004-x64
10nagogy-Client.exe
android-10-x64
nagogy-Client.exe
android-11-x64
nagogy-Client.exe
android-9-x86
nagogy-Client.exe
macos-10.15-amd64
1nagogy-Client.exe
debian-9-armhf
nagogy-Client.exe
debian-9-mips
nagogy-Client.exe
debian-9-mipsel
nagogy-Client.exe
ubuntu-18.04-amd64
Analysis
-
max time kernel
78s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 17:24
Behavioral task
behavioral1
Sample
nagogy-Client.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
nagogy-Client.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
nagogy-Client.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
nagogy-Client.exe
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
nagogy-Client.exe
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
nagogy-Client.exe
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
nagogy-Client.exe
Resource
macos-20220504-en
Behavioral task
behavioral8
Sample
nagogy-Client.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral9
Sample
nagogy-Client.exe
Resource
debian9-mipsbe-20221125-en
Behavioral task
behavioral10
Sample
nagogy-Client.exe
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral11
Sample
nagogy-Client.exe
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
nagogy-Client.exe
-
Size
159KB
-
MD5
ecca6b799f217842229d175a695d2993
-
SHA1
232d3b92b25224f6b97e961a10fc0175163f4cc4
-
SHA256
93e90ecd12401fad5032a113663d81cab58aa137c4baafb1628ef71c4c27ffb1
-
SHA512
6367675cb3f86b06c23854bfb829f92cb084caf34592038236d33110267938f9e97982f290dea819febcc66bb08e334ac4f170bd6664ea9b4fa49bd1f998cb46
-
SSDEEP
3072:T3sO174KPnPE73cMSfGGcADh0nVqLH4XOtpWH3mkl0mOlylll+ilkHmllillll+y:QxbSfGGjdY+t3scbsubRZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation nagogy-Client.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Services.url Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Services.url Client.exe -
Executes dropped EXE 2 IoCs
pid Process 3252 Client.exe 4380 Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5060 schtasks.exe 3208 schtasks.exe 3420 schtasks.exe 4852 schtasks.exe 764 schtasks.exe 3920 schtasks.exe -
Kills process with taskkill 6 IoCs
pid Process 1476 TASKKILL.exe 2520 TASKKILL.exe 4616 TASKKILL.exe 4188 TASKKILL.exe 368 TASKKILL.exe 3356 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe 4288 nagogy-Client.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4288 nagogy-Client.exe Token: SeDebugPrivilege 3356 TASKKILL.exe Token: SeDebugPrivilege 368 TASKKILL.exe Token: SeDebugPrivilege 3252 Client.exe Token: SeDebugPrivilege 2520 TASKKILL.exe Token: SeDebugPrivilege 1476 TASKKILL.exe Token: SeDebugPrivilege 4380 Client.exe Token: SeDebugPrivilege 4188 TASKKILL.exe Token: SeDebugPrivilege 4616 TASKKILL.exe Token: 33 3252 Client.exe Token: SeIncBasePriorityPrivilege 3252 Client.exe Token: 33 3252 Client.exe Token: SeIncBasePriorityPrivilege 3252 Client.exe Token: 33 3252 Client.exe Token: SeIncBasePriorityPrivilege 3252 Client.exe Token: 33 3252 Client.exe Token: SeIncBasePriorityPrivilege 3252 Client.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4384 4288 nagogy-Client.exe 85 PID 4288 wrote to memory of 4384 4288 nagogy-Client.exe 85 PID 4288 wrote to memory of 4384 4288 nagogy-Client.exe 85 PID 4288 wrote to memory of 5060 4288 nagogy-Client.exe 87 PID 4288 wrote to memory of 5060 4288 nagogy-Client.exe 87 PID 4288 wrote to memory of 5060 4288 nagogy-Client.exe 87 PID 4288 wrote to memory of 368 4288 nagogy-Client.exe 89 PID 4288 wrote to memory of 368 4288 nagogy-Client.exe 89 PID 4288 wrote to memory of 368 4288 nagogy-Client.exe 89 PID 4288 wrote to memory of 3356 4288 nagogy-Client.exe 90 PID 4288 wrote to memory of 3356 4288 nagogy-Client.exe 90 PID 4288 wrote to memory of 3356 4288 nagogy-Client.exe 90 PID 4288 wrote to memory of 4876 4288 nagogy-Client.exe 99 PID 4288 wrote to memory of 4876 4288 nagogy-Client.exe 99 PID 4288 wrote to memory of 4876 4288 nagogy-Client.exe 99 PID 4288 wrote to memory of 3208 4288 nagogy-Client.exe 101 PID 4288 wrote to memory of 3208 4288 nagogy-Client.exe 101 PID 4288 wrote to memory of 3208 4288 nagogy-Client.exe 101 PID 4288 wrote to memory of 3252 4288 nagogy-Client.exe 103 PID 4288 wrote to memory of 3252 4288 nagogy-Client.exe 103 PID 4288 wrote to memory of 3252 4288 nagogy-Client.exe 103 PID 3252 wrote to memory of 700 3252 Client.exe 104 PID 3252 wrote to memory of 700 3252 Client.exe 104 PID 3252 wrote to memory of 700 3252 Client.exe 104 PID 3252 wrote to memory of 3420 3252 Client.exe 106 PID 3252 wrote to memory of 3420 3252 Client.exe 106 PID 3252 wrote to memory of 3420 3252 Client.exe 106 PID 3252 wrote to memory of 2520 3252 Client.exe 109 PID 3252 wrote to memory of 2520 3252 Client.exe 109 PID 3252 wrote to memory of 2520 3252 Client.exe 109 PID 3252 wrote to memory of 1476 3252 Client.exe 108 PID 3252 wrote to memory of 1476 3252 Client.exe 108 PID 3252 wrote to memory of 1476 3252 Client.exe 108 PID 3252 wrote to memory of 1852 3252 Client.exe 113 PID 3252 wrote to memory of 1852 3252 Client.exe 113 PID 3252 wrote to memory of 1852 3252 Client.exe 113 PID 3252 wrote to memory of 4852 3252 Client.exe 115 PID 3252 wrote to memory of 4852 3252 Client.exe 115 PID 3252 wrote to memory of 4852 3252 Client.exe 115 PID 4380 wrote to memory of 2084 4380 Client.exe 118 PID 4380 wrote to memory of 2084 4380 Client.exe 118 PID 4380 wrote to memory of 2084 4380 Client.exe 118 PID 4380 wrote to memory of 764 4380 Client.exe 120 PID 4380 wrote to memory of 764 4380 Client.exe 120 PID 4380 wrote to memory of 764 4380 Client.exe 120 PID 4380 wrote to memory of 4616 4380 Client.exe 121 PID 4380 wrote to memory of 4616 4380 Client.exe 121 PID 4380 wrote to memory of 4616 4380 Client.exe 121 PID 4380 wrote to memory of 4188 4380 Client.exe 124 PID 4380 wrote to memory of 4188 4380 Client.exe 124 PID 4380 wrote to memory of 4188 4380 Client.exe 124 PID 4380 wrote to memory of 3864 4380 Client.exe 126 PID 4380 wrote to memory of 3864 4380 Client.exe 126 PID 4380 wrote to memory of 3864 4380 Client.exe 126 PID 4380 wrote to memory of 3920 4380 Client.exe 128 PID 4380 wrote to memory of 3920 4380 Client.exe 128 PID 4380 wrote to memory of 3920 4380 Client.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe"C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵PID:4384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe" /sc minute /mo 52⤵
- Creates scheduled task(s)
PID:5060
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵PID:4876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\nagogy-Client.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵PID:700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 53⤵
- Creates scheduled task(s)
PID:3420
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:1852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵PID:2084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 52⤵
- Creates scheduled task(s)
PID:764
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵PID:3864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:3920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5ecca6b799f217842229d175a695d2993
SHA1232d3b92b25224f6b97e961a10fc0175163f4cc4
SHA25693e90ecd12401fad5032a113663d81cab58aa137c4baafb1628ef71c4c27ffb1
SHA5126367675cb3f86b06c23854bfb829f92cb084caf34592038236d33110267938f9e97982f290dea819febcc66bb08e334ac4f170bd6664ea9b4fa49bd1f998cb46
-
Filesize
159KB
MD5ecca6b799f217842229d175a695d2993
SHA1232d3b92b25224f6b97e961a10fc0175163f4cc4
SHA25693e90ecd12401fad5032a113663d81cab58aa137c4baafb1628ef71c4c27ffb1
SHA5126367675cb3f86b06c23854bfb829f92cb084caf34592038236d33110267938f9e97982f290dea819febcc66bb08e334ac4f170bd6664ea9b4fa49bd1f998cb46
-
Filesize
159KB
MD5ecca6b799f217842229d175a695d2993
SHA1232d3b92b25224f6b97e961a10fc0175163f4cc4
SHA25693e90ecd12401fad5032a113663d81cab58aa137c4baafb1628ef71c4c27ffb1
SHA5126367675cb3f86b06c23854bfb829f92cb084caf34592038236d33110267938f9e97982f290dea819febcc66bb08e334ac4f170bd6664ea9b4fa49bd1f998cb46
-
Filesize
159KB
MD5ecca6b799f217842229d175a695d2993
SHA1232d3b92b25224f6b97e961a10fc0175163f4cc4
SHA25693e90ecd12401fad5032a113663d81cab58aa137c4baafb1628ef71c4c27ffb1
SHA5126367675cb3f86b06c23854bfb829f92cb084caf34592038236d33110267938f9e97982f290dea819febcc66bb08e334ac4f170bd6664ea9b4fa49bd1f998cb46
-
Filesize
176B
MD5f07bc1dce1490494825737ec642700f0
SHA1286877ffebff982ffd1e5e858120402a306908c5
SHA2568f2f0cd367ef69419f94cbfd4e44e09191da6625cb2589f4b2b85e7536531bb1
SHA5124bafad354184ed515898c6ec90a78a3e208b08b944fb2351839086bb869ff80345d2835f48e9484caac1ff40bfce02207f23ace8591c33db5b69c668a95e2a2f