Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
3f5150071c3d150a05841d0441146f3d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f5150071c3d150a05841d0441146f3d.exe
Resource
win10v2004-20231215-en
General
-
Target
3f5150071c3d150a05841d0441146f3d.exe
-
Size
167KB
-
MD5
3f5150071c3d150a05841d0441146f3d
-
SHA1
f2e83d34bb89b1e6bf94cb4f15f5e6a1e5385c2d
-
SHA256
af7453257601177a1f14dcb97ad0bbfafbf248c47eb03d7c591c2b86f3fa7647
-
SHA512
003972fa47abc8db1a96eca81001ce799bc48abbe51ad0d3d55195d4a6df0c957c20fa3644270f2a81ebe7ed72fda560d16136bc95290e163835ff4253f1710b
-
SSDEEP
3072:VBJE40+j3315rZhom7jhG6Wt800j9a1HBA+iZ7I:fCF+/XoVGHj9Qhu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3016 Ngihia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\V71IQL7HI7 = "C:\\Windows\\Ngihia.exe" Ngihia.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3f5150071c3d150a05841d0441146f3d.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3f5150071c3d150a05841d0441146f3d.exe File created C:\Windows\Ngihia.exe 3f5150071c3d150a05841d0441146f3d.exe File opened for modification C:\Windows\Ngihia.exe 3f5150071c3d150a05841d0441146f3d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International Ngihia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe 3016 Ngihia.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2060 3f5150071c3d150a05841d0441146f3d.exe 3016 Ngihia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3016 2060 3f5150071c3d150a05841d0441146f3d.exe 28 PID 2060 wrote to memory of 3016 2060 3f5150071c3d150a05841d0441146f3d.exe 28 PID 2060 wrote to memory of 3016 2060 3f5150071c3d150a05841d0441146f3d.exe 28 PID 2060 wrote to memory of 3016 2060 3f5150071c3d150a05841d0441146f3d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f5150071c3d150a05841d0441146f3d.exe"C:\Users\Admin\AppData\Local\Temp\3f5150071c3d150a05841d0441146f3d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Ngihia.exeC:\Windows\Ngihia.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD53f5150071c3d150a05841d0441146f3d
SHA1f2e83d34bb89b1e6bf94cb4f15f5e6a1e5385c2d
SHA256af7453257601177a1f14dcb97ad0bbfafbf248c47eb03d7c591c2b86f3fa7647
SHA512003972fa47abc8db1a96eca81001ce799bc48abbe51ad0d3d55195d4a6df0c957c20fa3644270f2a81ebe7ed72fda560d16136bc95290e163835ff4253f1710b
-
Filesize
344B
MD5410b5fc7c24a41257619bf882a9aff44
SHA12c12ff734ed7f89e782103adb8f9b68e0b96d60c
SHA2561353323857c137a908625a0df9182717284f081595dc95ff3f6e7b1960f62a1f
SHA5125c498670ad32a6c182b5b7876f157e91f890b929a4ea4fcf9127e96510ce31f9431e8bd463db3dea4d463ded7b6c88b691047f1062918223f6aa56ef98e33fb2