Resubmissions
23/09/2023, 09:41
230923-lnz9eaec2x 7Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
nfLauncher.exe
Resource
win10v2004-20230915-en
General
-
Target
nfLauncher.exe
-
Size
12.8MB
-
MD5
f4f7663fb64780988e5d8b63ee2dad6b
-
SHA1
c1ea790c9932327ae9f27680d36f54ab9288965b
-
SHA256
2b8df62a285264edd57e7c5c440b16fa702915d7eb11a2191556ec03a782ea95
-
SHA512
a746814154d1bf9aa286f60609038304876a298b8442a7082528e975a26745d918d0ae079382579ffe65f007c1d99fc5e22b241ab3e117d37a27aad5b50dfede
-
SSDEEP
393216:GP4Ufrifm/ULQLJy89BoFsdT3kE4DV4wj:GAs+f6UsLo89BoFG3x4DV/j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4780 NgeW.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 nfLauncher.exe File opened for modification \??\PhysicalDrive0 NgeW.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4080 nfLauncher.exe 4780 NgeW.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4080 nfLauncher.exe 4780 NgeW.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4780 NgeW.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4080 nfLauncher.exe 4780 NgeW.exe 4780 NgeW.exe 4780 NgeW.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4780 4080 nfLauncher.exe 93 PID 4080 wrote to memory of 4780 4080 nfLauncher.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\nfLauncher.exe"C:\Users\Admin\AppData\Local\Temp\nfLauncher.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\NgeW.exeC:\Users\Admin\AppData\Local\Temp\NgeW.exe -asec -rmf 433a2f55736572732f41646d696e2f417070446174612f4c6f63616c2f54656d702f6e664c61756e636865722e6578652⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD5ae950ad29f9b277f00a7de74d441b501
SHA16dcba78565a822ae3655226ea5a7165627fedc7a
SHA2564a2bf658a18a286c8ae669b886abfb4b54cdaf062ba831e6a2c4e5b0a0ab6c63
SHA51274792e5e428a3299fea24a518a84c71802d18454ae5dcc6b26fc0f5fef2bd463fc1462c01e4e63cd005d802cd30cdfdd905b93b3622cdcedb2766d2a69796a71
-
Filesize
13.1MB
MD5ae950ad29f9b277f00a7de74d441b501
SHA16dcba78565a822ae3655226ea5a7165627fedc7a
SHA2564a2bf658a18a286c8ae669b886abfb4b54cdaf062ba831e6a2c4e5b0a0ab6c63
SHA51274792e5e428a3299fea24a518a84c71802d18454ae5dcc6b26fc0f5fef2bd463fc1462c01e4e63cd005d802cd30cdfdd905b93b3622cdcedb2766d2a69796a71