Overview
overview
10Static
static
3Nishikigi/...A4.exe
windows7-x64
1Nishikigi/...A4.exe
windows10-2004-x64
1Nishikigi/...2C.exe
windows7-x64
8Nishikigi/...2C.exe
windows10-2004-x64
8Nishikigi/FHL#a.exe
windows7-x64
10Nishikigi/FHL#a.exe
windows10-2004-x64
10Nishikigi/...%p.exe
windows7-x64
7Nishikigi/...%p.exe
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 11:52
Static task
static1
Behavioral task
behavioral1
Sample
Nishikigi/5EDB6BA4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Nishikigi/5EDB6BA4.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Nishikigi/AD39F22C.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Nishikigi/AD39F22C.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Nishikigi/FHL#a.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Nishikigi/FHL#a.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Nishikigi/云通登录端%p.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Nishikigi/云通登录端%p.exe
Resource
win10v2004-20230703-en
General
-
Target
Nishikigi/云通登录端%p.exe
-
Size
179KB
-
MD5
fffedf97b0e3f51bb6c7d0027adc5757
-
SHA1
da9a918a8cbc13906909745d2952f768be243abd
-
SHA256
0559217e7c7af4ac5f251b586d7cfe22fc360c0eafbb34af4230bbc7c952e302
-
SHA512
b6e1c146a430daa9010ec6f05e4b061ed149ed3ccaa887099c14045c3241a034cbcac9a0e8959256d309f62493ed01bf028cda8ece90053a8ec892acdd742f67
-
SSDEEP
3072:XANQiRlneHvgD+7KD4b0MVwxLnEE84LWSmoY46GKXIl8GhlKxA:XA/RBeHvgD+mDS0BLEE9cohkXq8Sp
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Notifie.lnk phqghumeay.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Notifie.lnk phqghumeay.exe -
Executes dropped EXE 2 IoCs
pid Process 816 MPGXZSXX.exe 2708 phqghumeay.exe -
Loads dropped DLL 2 IoCs
pid Process 816 MPGXZSXX.exe 816 MPGXZSXX.exe -
resource yara_rule behavioral7/memory/816-126-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-130-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-129-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-131-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-132-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-133-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-135-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-134-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-136-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-137-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx behavioral7/memory/816-140-0x0000000003BC0000-0x0000000003D41000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 云通登录端%p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde 云通登录端%p.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe 816 MPGXZSXX.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 816 2312 云通登录端%p.exe 30 PID 2312 wrote to memory of 816 2312 云通登录端%p.exe 30 PID 2312 wrote to memory of 816 2312 云通登录端%p.exe 30 PID 2312 wrote to memory of 816 2312 云通登录端%p.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nishikigi\云通登录端%p.exe"C:\Users\Admin\AppData\Local\Temp\Nishikigi\云通登录端%p.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\MPGXZSXX\MPGXZSXX.exe"C:\MPGXZSXX\MPGXZSXX.exe" -hj2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
C:\edaa\phqghumeay\phqghumeay.exe"C:\edaa\phqghumeay\phqghumeay.exe" C:\edaa\phqghumeay\phqghumeay.zip -d C:\Users\Admin\AppData\Roaming1⤵
- Drops startup file
- Executes dropped EXE
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD52db518107c8b5a29dc74547773e3b07a
SHA159825db2c530d315fc7c549e6c80a9d4b0a5d2e4
SHA2569c1ebc705ba6911653d98d281636bad39e172f971552ee419a3189a3dc184a61
SHA51212ddea2400882400bd2ec2ca18142d673ec30d1af8999f112b4f5e9aeab60d437f7d4aa07dd9b9e4d08f8f90dc1e3ebdb08a77aea63068491d3d2790899276bc
-
Filesize
64KB
MD5c9ec8833f64bb6a06996243a88228740
SHA1204dd511031fbceee22e56be66242129d3044534
SHA256876aaff08167deb6c75c4091bc146dcd63df1006d3586273fa45c56a37945549
SHA512d6e796c2f43377d2fa00dc5238c5dbe7635b2e6aa0e50309b5749c1ae4df736add95782e697c70e116d74f8722a387c4a9d00fb5165e0da7351b06886ff628a7
-
Filesize
64KB
MD5c9ec8833f64bb6a06996243a88228740
SHA1204dd511031fbceee22e56be66242129d3044534
SHA256876aaff08167deb6c75c4091bc146dcd63df1006d3586273fa45c56a37945549
SHA512d6e796c2f43377d2fa00dc5238c5dbe7635b2e6aa0e50309b5749c1ae4df736add95782e697c70e116d74f8722a387c4a9d00fb5165e0da7351b06886ff628a7
-
Filesize
1.7MB
MD56eef52f5fc71c0aec40ec5d9632500f5
SHA19bd31aafa1caa9c88b0c8c041819d322f9e36ff7
SHA2562421a60b89995fc9ab83e8121595a573ef663a2b5226a668b7bb7d82dd35040d
SHA51204a967276a8f545379ff391193b7a799351ec469dff1bdec984b2b354b1bb3143d7450afc54de43a62ac780c0880f16ca3e1ec539e3300cca5f493a4393da1a4
-
Filesize
34B
MD53a9e6f4a8bcf335a1ae23af2a3dcc467
SHA1db54dfd712bc21445759dbcd1c6e14d279418810
SHA256312cd38302f393b930004ac1038f6804a3fc9b0b5c93455ed8e5b254b56f305c
SHA512a3d20604df640c56df2c465a8d6da407660c5a9105399e315ba1bc736340fdc7fe83dcf15917a7839611575b8498827cff6a30f1f370385d148c5fd9572dc632
-
Filesize
216KB
MD5d976a3cfe0eb543955c205f5dd290034
SHA15f02716608aa7ef2c412003639d5dc1a27f8b7d0
SHA256b306883d57ecef624d10083e9b75d452e1365770e9d196589688a1f996a6813e
SHA512f854ae30943e601fa3f7aaa64062dd6ae1a0be3f2d3603631092ba03ae4706e83ebfb9de2e7d23d92820627d5b5af3c81dff262b1aa96d797f97f4c7327d63f9
-
Filesize
1KB
MD5157675d427f9c1fa965684d445b1fc24
SHA1cfa77184a285f794f761febb5ec6867381ac6a81
SHA256ec5fccce519161a9b43a5fc603c655399c02ebfb49015f9519ff98e080c31886
SHA512b55e0abedc5b7bb6ba5e0bb2a51092766a5698571bf6797de89d999608a3812c017bdbf1e7447b7a759fc24d13b7a41b0198ea163b18dfe2318d6a3b7fd836b4
-
Filesize
270KB
MD52db518107c8b5a29dc74547773e3b07a
SHA159825db2c530d315fc7c549e6c80a9d4b0a5d2e4
SHA2569c1ebc705ba6911653d98d281636bad39e172f971552ee419a3189a3dc184a61
SHA51212ddea2400882400bd2ec2ca18142d673ec30d1af8999f112b4f5e9aeab60d437f7d4aa07dd9b9e4d08f8f90dc1e3ebdb08a77aea63068491d3d2790899276bc
-
Filesize
216KB
MD5d976a3cfe0eb543955c205f5dd290034
SHA15f02716608aa7ef2c412003639d5dc1a27f8b7d0
SHA256b306883d57ecef624d10083e9b75d452e1365770e9d196589688a1f996a6813e
SHA512f854ae30943e601fa3f7aaa64062dd6ae1a0be3f2d3603631092ba03ae4706e83ebfb9de2e7d23d92820627d5b5af3c81dff262b1aa96d797f97f4c7327d63f9