Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 07:44

General

  • Target

    IMG001.exe

  • Size

    3.4MB

  • MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

  • SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

  • SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

  • SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • SSDEEP

    98304:MxtVPnq1y5tQOM33ZNqCtBixHl54Oyjes1bo5:uVPq1yLanrqTr43eSG

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 10 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG001.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG001.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im tftp.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1380
    • C:\Users\Admin\AppData\Local\Temp\tftp.exe
      "C:\Users\Admin\AppData\Local\Temp\tftp.exe"
      2⤵
      • Executes dropped EXE
      PID:376
    • C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe
      "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1240
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im tftp.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1564
      • C:\Users\Admin\AppData\Local\Temp\tftp.exe
        "C:\Users\Admin\AppData\Local\Temp\tftp.exe"
        3⤵
        • Executes dropped EXE
        PID:1624
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ
          4⤵
          • Adds Run key to start application
          PID:564
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"
          4⤵
          • Drops file in Windows directory
          • Creates scheduled task(s)
          PID:1540
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 000
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\powercfg.exe
          powercfg /CHANGE -standby-timeout-ac 0
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2000
        • C:\Windows\SysWOW64\powercfg.exe
          powercfg /CHANGE -hibernate-timeout-ac 0
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1348
        • C:\Windows\SysWOW64\powercfg.exe
          Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 000
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso6E40.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • C:\Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • C:\Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • C:\Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe

    Filesize

    3.4MB

    MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

    SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

    SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

    SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe

    Filesize

    3.4MB

    MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

    SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

    SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

    SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe

    Filesize

    3.4MB

    MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

    SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

    SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

    SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • \Users\Admin\AppData\Local\Temp\nso6E40.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • \Users\Admin\AppData\Local\Temp\nso6E40.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • \Users\Admin\AppData\Local\Temp\nso6E40.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • \Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • \Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • \Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • \Users\Admin\AppData\Local\Temp\tftp.exe

    Filesize

    95KB

    MD5

    461ed9a62b59cf0436ab6cee3c60fe85

    SHA1

    3f41a2796cc993a1d2196d1973f2cd1990a8c505

    SHA256

    40fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d

    SHA512

    5f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef

  • \Users\Admin\AppData\Roaming\NsMiner\IMG001.exe

    Filesize

    3.4MB

    MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

    SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

    SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

    SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • \Users\Admin\AppData\Roaming\NsMiner\IMG001.exe

    Filesize

    3.4MB

    MD5

    d59e32eefe00e9bf9e0f5dafe68903fb

    SHA1

    99dc19e93978f7f2838c26f01bdb63ed2f16862b

    SHA256

    e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145

    SHA512

    56a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587

  • memory/376-72-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1624-91-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1624-93-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB