Analysis

  • max time kernel
    128s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-11-2023 04:36

General

  • Target

    NIKO.exe

  • Size

    187KB

  • MD5

    5459c9375d4b07132878457d88b1176e

  • SHA1

    142909a0f30e8cad6e53666ba616892ea1067af6

  • SHA256

    fd42570db71afaa782fb3f824ea87057661d2910d8914453d181b3a3652b1617

  • SHA512

    51f5b8fe285e47417639c15a6c22ad3715f51d0ed842fb69923278f9ed1ad10d1d90c33d4f64ccb3a852738fc271992243048939f2b0909601742bd22f3ee58e

  • SSDEEP

    3072:VahKyd2n31e5GWp1icKAArDZz4N9GhbkrNEk1rJ4ZIJbvKuF//GT:VahOep0yN90QE44ekY//e

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NIKO.exe
    "C:\Users\Admin\AppData\Local\Temp\NIKO.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c "NIKO.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\System32\findstr.exe
        findstr /rxc:".*" "NIKO.bat"
        3⤵
          PID:1340
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          3⤵
            PID:2980
          • C:\Windows\System32\reg.exe
            reg query "HKCU\Console" /v ForceV2
            3⤵
              PID:1104
            • C:\Windows\System32\find.exe
              find /i "0x0"
              3⤵
                PID:2796
              • C:\Windows\System32\fltMC.exe
                fltmc
                3⤵
                  PID:2940
                • C:\Windows\System32\mode.com
                  mode con cols=55 lines=20
                  3⤵
                    PID:2920

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NIKO.bat

                Filesize

                225KB

                MD5

                4d3dc5ec43a3388dad3fe4d1bf03aaac

                SHA1

                ff23b4fffcd2800909472bf33ed83319de3350c5

                SHA256

                142843e7ec326e5c0d46b9139c33f35d6f655e8c61e529b08818216ce6835030

                SHA512

                dcfb4bcd6fefef6800109626fa1af27cf364afd4e65803747ac44fc06395cd2316522a294f71323f7c94cddfd0f3c588840b9f430c1ff21eb0eb8f82dbfec9e5