Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
89753d8050a2a41c24f85dd57b0a5a72.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89753d8050a2a41c24f85dd57b0a5a72.exe
Resource
win10v2004-20231215-en
General
-
Target
89753d8050a2a41c24f85dd57b0a5a72.exe
-
Size
262KB
-
MD5
89753d8050a2a41c24f85dd57b0a5a72
-
SHA1
8cb52e457c31bd78c157e7305941135c0db4294f
-
SHA256
f18bd979ea4eb2d374bef76270bc02ac31955bd421b911864ded3b2ccae2fb20
-
SHA512
dc788a715ba4b0ee4cf8450c7ee1e93d3b8b7cf10bb6968c62f7cce141e3bbe63c18feae29f52e590d3b2c27fdc0fc23544de1785b0bd980c882a4742c885230
-
SSDEEP
6144:iS8Gp+df0afmVTRMd/dpn94sLrNXel9Ab98+MA7U:F8YkfXf4TRMx94svNuzAb9ZC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 noki.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 89753d8050a2a41c24f85dd57b0a5a72.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6CF0A0C8-CEE0-AD4E-46DF-EAE75CAEC9FA} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytawmo\\noki.exe" noki.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 844 2236 WerFault.exe 29 2312 844 WerFault.exe 31 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 89753d8050a2a41c24f85dd57b0a5a72.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 89753d8050a2a41c24f85dd57b0a5a72.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe 2376 noki.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1932 89753d8050a2a41c24f85dd57b0a5a72.exe Token: SeSecurityPrivilege 1932 89753d8050a2a41c24f85dd57b0a5a72.exe Token: SeSecurityPrivilege 1932 89753d8050a2a41c24f85dd57b0a5a72.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 2376 noki.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2376 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 28 PID 1932 wrote to memory of 2376 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 28 PID 1932 wrote to memory of 2376 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 28 PID 1932 wrote to memory of 2376 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 28 PID 2376 wrote to memory of 1108 2376 noki.exe 8 PID 2376 wrote to memory of 1108 2376 noki.exe 8 PID 2376 wrote to memory of 1108 2376 noki.exe 8 PID 2376 wrote to memory of 1108 2376 noki.exe 8 PID 2376 wrote to memory of 1108 2376 noki.exe 8 PID 2376 wrote to memory of 1172 2376 noki.exe 7 PID 2376 wrote to memory of 1172 2376 noki.exe 7 PID 2376 wrote to memory of 1172 2376 noki.exe 7 PID 2376 wrote to memory of 1172 2376 noki.exe 7 PID 2376 wrote to memory of 1172 2376 noki.exe 7 PID 2376 wrote to memory of 1208 2376 noki.exe 6 PID 2376 wrote to memory of 1208 2376 noki.exe 6 PID 2376 wrote to memory of 1208 2376 noki.exe 6 PID 2376 wrote to memory of 1208 2376 noki.exe 6 PID 2376 wrote to memory of 1208 2376 noki.exe 6 PID 2376 wrote to memory of 544 2376 noki.exe 4 PID 2376 wrote to memory of 544 2376 noki.exe 4 PID 2376 wrote to memory of 544 2376 noki.exe 4 PID 2376 wrote to memory of 544 2376 noki.exe 4 PID 2376 wrote to memory of 544 2376 noki.exe 4 PID 2376 wrote to memory of 1932 2376 noki.exe 27 PID 2376 wrote to memory of 1932 2376 noki.exe 27 PID 2376 wrote to memory of 1932 2376 noki.exe 27 PID 2376 wrote to memory of 1932 2376 noki.exe 27 PID 2376 wrote to memory of 1932 2376 noki.exe 27 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 1932 wrote to memory of 2236 1932 89753d8050a2a41c24f85dd57b0a5a72.exe 29 PID 2236 wrote to memory of 844 2236 cmd.exe 31 PID 2236 wrote to memory of 844 2236 cmd.exe 31 PID 2236 wrote to memory of 844 2236 cmd.exe 31 PID 2236 wrote to memory of 844 2236 cmd.exe 31 PID 2376 wrote to memory of 1624 2376 noki.exe 30 PID 2376 wrote to memory of 1624 2376 noki.exe 30 PID 2376 wrote to memory of 1624 2376 noki.exe 30 PID 2376 wrote to memory of 1624 2376 noki.exe 30 PID 2376 wrote to memory of 1624 2376 noki.exe 30 PID 2376 wrote to memory of 844 2376 noki.exe 31 PID 2376 wrote to memory of 844 2376 noki.exe 31 PID 2376 wrote to memory of 844 2376 noki.exe 31 PID 2376 wrote to memory of 844 2376 noki.exe 31 PID 2376 wrote to memory of 844 2376 noki.exe 31 PID 844 wrote to memory of 2312 844 WerFault.exe 32 PID 844 wrote to memory of 2312 844 WerFault.exe 32 PID 844 wrote to memory of 2312 844 WerFault.exe 32 PID 844 wrote to memory of 2312 844 WerFault.exe 32
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:544
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\89753d8050a2a41c24f85dd57b0a5a72.exe"C:\Users\Admin\AppData\Local\Temp\89753d8050a2a41c24f85dd57b0a5a72.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Ytawmo\noki.exe"C:\Users\Admin\AppData\Roaming\Ytawmo\noki.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpceda3d41.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1164⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 5365⤵
- Program crash
PID:2312
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1033111552-42320358-1725152531802477302890655629-1141367883-1312066316-952559566"1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD534a9c8b2b34b6ef36871fab4537d5ce8
SHA1121ff7e7531589a273a4be0088312b3158ee3372
SHA256fa85de9a407c9a3f20a66528ec949ce645c8d32bd7467e3d1f2d7771b220d4e3
SHA51284d461b44ec52a5bd40c891d27024b9c5d42727fb5908b30f4c6a95687ad1e273bbea57cdee486b654746e14691d40fb54b9232e3071dda23c8dc835af9a07bc
-
Filesize
262KB
MD5b6a4799b690622afc4f13cfcc7145625
SHA105729973c01acece086b0a01005f6699d749e186
SHA256357fe5456b906d51b8cf00f745f5f055678894da3b155ab76559d21a444afa59
SHA512e6e27a5652f8fb71afea0bd98b484d5597bc402a15d4d41543b1a925390c551e87c31576e0d6d6ff39071f9220a641bdf1108a8a86368f47a75261e943f185e8