Analysis
-
max time kernel
128s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
17-11-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
NIKO.exe
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
NIKO.exe
Resource
win10v2004-20231020-en
General
-
Target
NIKO.exe
-
Size
187KB
-
MD5
5459c9375d4b07132878457d88b1176e
-
SHA1
142909a0f30e8cad6e53666ba616892ea1067af6
-
SHA256
fd42570db71afaa782fb3f824ea87057661d2910d8914453d181b3a3652b1617
-
SHA512
51f5b8fe285e47417639c15a6c22ad3715f51d0ed842fb69923278f9ed1ad10d1d90c33d4f64ccb3a852738fc271992243048939f2b0909601742bd22f3ee58e
-
SSDEEP
3072:VahKyd2n31e5GWp1icKAArDZz4N9GhbkrNEk1rJ4ZIJbvKuF//GT:VahOep0yN90QE44ekY//e
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NIKO.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4296 wrote to memory of 2596 4296 NIKO.exe 71 PID 4296 wrote to memory of 2596 4296 NIKO.exe 71 PID 2596 wrote to memory of 1340 2596 cmd.exe 73 PID 2596 wrote to memory of 1340 2596 cmd.exe 73 PID 2596 wrote to memory of 2980 2596 cmd.exe 74 PID 2596 wrote to memory of 2980 2596 cmd.exe 74 PID 2596 wrote to memory of 1104 2596 cmd.exe 75 PID 2596 wrote to memory of 1104 2596 cmd.exe 75 PID 2596 wrote to memory of 2796 2596 cmd.exe 76 PID 2596 wrote to memory of 2796 2596 cmd.exe 76 PID 2596 wrote to memory of 2940 2596 cmd.exe 77 PID 2596 wrote to memory of 2940 2596 cmd.exe 77 PID 2596 wrote to memory of 2920 2596 cmd.exe 78 PID 2596 wrote to memory of 2920 2596 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\NIKO.exe"C:\Users\Admin\AppData\Local\Temp\NIKO.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SYSTEM32\cmd.execmd /c "NIKO.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\System32\findstr.exefindstr /rxc:".*" "NIKO.bat"3⤵PID:1340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵PID:2980
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV23⤵PID:1104
-
-
C:\Windows\System32\find.exefind /i "0x0"3⤵PID:2796
-
-
C:\Windows\System32\fltMC.exefltmc3⤵PID:2940
-
-
C:\Windows\System32\mode.commode con cols=55 lines=203⤵PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD54d3dc5ec43a3388dad3fe4d1bf03aaac
SHA1ff23b4fffcd2800909472bf33ed83319de3350c5
SHA256142843e7ec326e5c0d46b9139c33f35d6f655e8c61e529b08818216ce6835030
SHA512dcfb4bcd6fefef6800109626fa1af27cf364afd4e65803747ac44fc06395cd2316522a294f71323f7c94cddfd0f3c588840b9f430c1ff21eb0eb8f82dbfec9e5