Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
NIKO.exe
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
NIKO.exe
Resource
win10v2004-20231020-en
General
-
Target
NIKO.exe
-
Size
187KB
-
MD5
5459c9375d4b07132878457d88b1176e
-
SHA1
142909a0f30e8cad6e53666ba616892ea1067af6
-
SHA256
fd42570db71afaa782fb3f824ea87057661d2910d8914453d181b3a3652b1617
-
SHA512
51f5b8fe285e47417639c15a6c22ad3715f51d0ed842fb69923278f9ed1ad10d1d90c33d4f64ccb3a852738fc271992243048939f2b0909601742bd22f3ee58e
-
SSDEEP
3072:VahKyd2n31e5GWp1icKAArDZz4N9GhbkrNEk1rJ4ZIJbvKuF//GT:VahOep0yN90QE44ekY//e
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NIKO.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3600 wrote to memory of 1280 3600 NIKO.exe 82 PID 3600 wrote to memory of 1280 3600 NIKO.exe 82 PID 1280 wrote to memory of 3012 1280 cmd.exe 106 PID 1280 wrote to memory of 3012 1280 cmd.exe 106 PID 1280 wrote to memory of 4992 1280 cmd.exe 107 PID 1280 wrote to memory of 4992 1280 cmd.exe 107 PID 1280 wrote to memory of 3416 1280 cmd.exe 108 PID 1280 wrote to memory of 3416 1280 cmd.exe 108 PID 1280 wrote to memory of 4788 1280 cmd.exe 109 PID 1280 wrote to memory of 4788 1280 cmd.exe 109 PID 1280 wrote to memory of 3108 1280 cmd.exe 110 PID 1280 wrote to memory of 3108 1280 cmd.exe 110 PID 1280 wrote to memory of 4280 1280 cmd.exe 111 PID 1280 wrote to memory of 4280 1280 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NIKO.exe"C:\Users\Admin\AppData\Local\Temp\NIKO.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SYSTEM32\cmd.execmd /c "NIKO.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\System32\findstr.exefindstr /rxc:".*" "NIKO.bat"3⤵PID:3012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵PID:4992
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV23⤵PID:3416
-
-
C:\Windows\System32\find.exefind /i "0x0"3⤵PID:4788
-
-
C:\Windows\System32\fltMC.exefltmc3⤵PID:3108
-
-
C:\Windows\System32\mode.commode con cols=55 lines=203⤵PID:4280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD54d3dc5ec43a3388dad3fe4d1bf03aaac
SHA1ff23b4fffcd2800909472bf33ed83319de3350c5
SHA256142843e7ec326e5c0d46b9139c33f35d6f655e8c61e529b08818216ce6835030
SHA512dcfb4bcd6fefef6800109626fa1af27cf364afd4e65803747ac44fc06395cd2316522a294f71323f7c94cddfd0f3c588840b9f430c1ff21eb0eb8f82dbfec9e5