Analysis
-
max time kernel
102s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
14287df8a3f5589f8468c7cb251f2373.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14287df8a3f5589f8468c7cb251f2373.exe
Resource
win10v2004-20231215-en
General
-
Target
14287df8a3f5589f8468c7cb251f2373.exe
-
Size
76KB
-
MD5
14287df8a3f5589f8468c7cb251f2373
-
SHA1
d76437768f86735273491fe26390e35ea53596b8
-
SHA256
9adcd3f4f01336f3feec290a1a2ae01fec67a09078547c574cca225c710a403d
-
SHA512
760f0e6d1a3e827d59bc982d14622848da1a835f35b0538a16d18886fe54a09543c2769a0bd62b25adc14ee2997cd4adc93560a4d39030a05808816a3b134075
-
SSDEEP
768:RZVy+DZ4mV+RMO2rhgFwuqCbxTGy/BBGg4NKhLU4dhbDW2+Kv00dX0vN0TlT+Xya:7amlu3hbBGy3G8nhMpDz
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 14287df8a3f5589f8468c7cb251f2373.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ndst.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 ndst.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 14287df8a3f5589f8468c7cb251f2373.exe 2536 14287df8a3f5589f8468c7cb251f2373.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ndst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" ndst.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: ndst.exe File opened (read-only) \??\R: ndst.exe File opened (read-only) \??\Z: ndst.exe File opened (read-only) \??\G: ndst.exe File opened (read-only) \??\I: ndst.exe File opened (read-only) \??\K: ndst.exe File opened (read-only) \??\Q: ndst.exe File opened (read-only) \??\V: ndst.exe File opened (read-only) \??\Y: ndst.exe File opened (read-only) \??\E: ndst.exe File opened (read-only) \??\H: ndst.exe File opened (read-only) \??\M: ndst.exe File opened (read-only) \??\P: ndst.exe File opened (read-only) \??\S: ndst.exe File opened (read-only) \??\J: ndst.exe File opened (read-only) \??\L: ndst.exe File opened (read-only) \??\N: ndst.exe File opened (read-only) \??\W: ndst.exe File opened (read-only) \??\X: ndst.exe File opened (read-only) \??\B: ndst.exe File opened (read-only) \??\T: ndst.exe File opened (read-only) \??\U: ndst.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\maxtrox.txt 14287df8a3f5589f8468c7cb251f2373.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr 14287df8a3f5589f8468c7cb251f2373.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ndst.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr ndst.exe File created \??\c:\windows\SysWOW64\Desktop.sysm ndst.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm ndst.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe ndst.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe ndst.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\private_browsing.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe ndst.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe ndst.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe ndst.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe ndst.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe ndst.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe ndst.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe ndst.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe ndst.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm ndst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command ndst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command 14287df8a3f5589f8468c7cb251f2373.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 14287df8a3f5589f8468c7cb251f2373.exe 2636 ndst.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2636 2536 14287df8a3f5589f8468c7cb251f2373.exe 18 PID 2536 wrote to memory of 2636 2536 14287df8a3f5589f8468c7cb251f2373.exe 18 PID 2536 wrote to memory of 2636 2536 14287df8a3f5589f8468c7cb251f2373.exe 18 PID 2536 wrote to memory of 2636 2536 14287df8a3f5589f8468c7cb251f2373.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\14287df8a3f5589f8468c7cb251f2373.exe"C:\Users\Admin\AppData\Local\Temp\14287df8a3f5589f8468c7cb251f2373.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\ndst.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\ndst.exe" 14287df8a3f5589f8468c7cb251f23732⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5ae9b29f25eeba1b9c7a61be24df1caf6
SHA16daf687441588e74e1479e890fbc796e6032ad1d
SHA256944d5e4c32044105130a8218b9b44d698de2322309dddf8e8f213a36369da028
SHA51293323c634d9cb51ab3483abd4dca8a3f05bd1f9d362119a94dca2e9f6c02bceb14b090e833ed203b064400afe0b01225ce186bb61593d0ba43a9a254bb1d0928