Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
03a619eb059e64fe9fabf3b040ff9c7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03a619eb059e64fe9fabf3b040ff9c7e.exe
Resource
win10v2004-20231215-en
General
-
Target
03a619eb059e64fe9fabf3b040ff9c7e.exe
-
Size
60KB
-
MD5
03a619eb059e64fe9fabf3b040ff9c7e
-
SHA1
3de0c298db6a3bad8f5402eab23a6acfa2774d8a
-
SHA256
695042b0ff3b40f0681e13179c3fa666b1e14448c39d52c775700f9a92583f0f
-
SHA512
3d4a350733726ecc467596be4f88760142355d6ebdbfe1d945417a592efd4b9783412c0208c3484fdaeda2d31e99a6c65ee650fe2a4e6dab30d9a50d8978987a
-
SSDEEP
768:I++1bYHKDE0zLvBoSDtFJEVydlbEXZsUUNRmFBv7mYYSIq+lgOmOVsOXUcs:H+1cHsEQyaTlwXqNMvK3Sz+lKGp
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run nuxynobu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\z0mllAKInb = "C:\\ProgramData\\finknqvk\\nuxynobu.exe" nuxynobu.exe -
Executes dropped EXE 1 IoCs
pid Process 908 nuxynobu.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 424 03a619eb059e64fe9fabf3b040ff9c7e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 424 wrote to memory of 908 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 106 PID 424 wrote to memory of 908 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 106 PID 424 wrote to memory of 908 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 106 PID 424 wrote to memory of 1748 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 107 PID 424 wrote to memory of 1748 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 107 PID 424 wrote to memory of 1748 424 03a619eb059e64fe9fabf3b040ff9c7e.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a619eb059e64fe9fabf3b040ff9c7e.exe"C:\Users\Admin\AppData\Local\Temp\03a619eb059e64fe9fabf3b040ff9c7e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:424 -
C:\ProgramData\finknqvk\nuxynobu.exeC:\ProgramData\finknqvk\nuxynobu.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:908
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\03A619~1.EXE.bak >> NUL2⤵PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD503a619eb059e64fe9fabf3b040ff9c7e
SHA13de0c298db6a3bad8f5402eab23a6acfa2774d8a
SHA256695042b0ff3b40f0681e13179c3fa666b1e14448c39d52c775700f9a92583f0f
SHA5123d4a350733726ecc467596be4f88760142355d6ebdbfe1d945417a592efd4b9783412c0208c3484fdaeda2d31e99a6c65ee650fe2a4e6dab30d9a50d8978987a