Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
14287df8a3f5589f8468c7cb251f2373.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14287df8a3f5589f8468c7cb251f2373.exe
Resource
win10v2004-20231215-en
General
-
Target
14287df8a3f5589f8468c7cb251f2373.exe
-
Size
76KB
-
MD5
14287df8a3f5589f8468c7cb251f2373
-
SHA1
d76437768f86735273491fe26390e35ea53596b8
-
SHA256
9adcd3f4f01336f3feec290a1a2ae01fec67a09078547c574cca225c710a403d
-
SHA512
760f0e6d1a3e827d59bc982d14622848da1a835f35b0538a16d18886fe54a09543c2769a0bd62b25adc14ee2997cd4adc93560a4d39030a05808816a3b134075
-
SSDEEP
768:RZVy+DZ4mV+RMO2rhgFwuqCbxTGy/BBGg4NKhLU4dhbDW2+Kv00dX0vN0TlT+Xya:7amlu3hbBGy3G8nhMpDz
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ncsa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 14287df8a3f5589f8468c7cb251f2373.exe -
Executes dropped EXE 1 IoCs
pid Process 4212 ncsa.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" ncsa.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: ncsa.exe File opened (read-only) \??\E: ncsa.exe File opened (read-only) \??\J: ncsa.exe File opened (read-only) \??\M: ncsa.exe File opened (read-only) \??\N: ncsa.exe File opened (read-only) \??\X: ncsa.exe File opened (read-only) \??\B: ncsa.exe File opened (read-only) \??\K: ncsa.exe File opened (read-only) \??\R: ncsa.exe File opened (read-only) \??\U: ncsa.exe File opened (read-only) \??\S: ncsa.exe File opened (read-only) \??\V: ncsa.exe File opened (read-only) \??\G: ncsa.exe File opened (read-only) \??\I: ncsa.exe File opened (read-only) \??\L: ncsa.exe File opened (read-only) \??\O: ncsa.exe File opened (read-only) \??\W: ncsa.exe File opened (read-only) \??\Y: ncsa.exe File opened (read-only) \??\H: ncsa.exe File opened (read-only) \??\P: ncsa.exe File opened (read-only) \??\Q: ncsa.exe File opened (read-only) \??\T: ncsa.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\Windows 3D.scr 14287df8a3f5589f8468c7cb251f2373.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ncsa.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr ncsa.exe File created \??\c:\windows\SysWOW64\Desktop.sysm ncsa.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm ncsa.exe File created \??\c:\windows\SysWOW64\maxtrox.txt 14287df8a3f5589f8468c7cb251f2373.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\setup_wm.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe ncsa.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe ncsa.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe ncsa.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\private_browsing.exe ncsa.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe ncsa.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe ncsa.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe ncsa.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe ncsa.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe ncsa.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe ncsa.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe ncsa.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command 14287df8a3f5589f8468c7cb251f2373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ncsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open 14287df8a3f5589f8468c7cb251f2373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon ncsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command ncsa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3036 14287df8a3f5589f8468c7cb251f2373.exe 4212 ncsa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3036 wrote to memory of 4212 3036 14287df8a3f5589f8468c7cb251f2373.exe 89 PID 3036 wrote to memory of 4212 3036 14287df8a3f5589f8468c7cb251f2373.exe 89 PID 3036 wrote to memory of 4212 3036 14287df8a3f5589f8468c7cb251f2373.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\14287df8a3f5589f8468c7cb251f2373.exe"C:\Users\Admin\AppData\Local\Temp\14287df8a3f5589f8468c7cb251f2373.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\ncsa.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\ncsa.exe" 14287df8a3f5589f8468c7cb251f23732⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4212
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD521e5fe5ca6eddf8c1f1838963a0a2baf
SHA1a496821a632741acae36d12656c19a8fbbc2da24
SHA256f072f422e0180ccd6d8eed52195833333bb9d9fa44a19837e0027ee96b3a7654
SHA51248bf58582454dbf28d7a5f92dc14572d30bf76a06aed8c02fb2f3d683226b88cbfe5f29eed1ff1a59fdea9755e2252d3e0df9b5cdac6763a56d7ce005e6661c0
-
Filesize
76KB
MD5433d2ffac69d00ed101afcc7fd631496
SHA10b45c0293699282619d6e188e44714893d49c2e5
SHA256dfc48b0e57bd852d4909214001f9b139b43e5b4387c213a1365bce2e260a6279
SHA512eedc66abfdcd4c42b0e63d5767be82a4001ab991d9d4eeededcb655bd12649b65f4888b34fce42abe21902392434389006b7964843c3db36fc4cffdad3627921
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062