Resubmissions
10-03-2024 18:52
240310-xjempaab45 10Analysis
-
max time kernel
156s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 18:52
Behavioral task
behavioral1
Sample
Nuke.exe
Resource
win7-20240221-en
General
-
Target
Nuke.exe
-
Size
13.4MB
-
MD5
4e5e0431625d13451f78d390a982b437
-
SHA1
48a38cd998f5f40f079cafada3ba209936841ba5
-
SHA256
c9ab278f3f277b37f21385531d827d917c26b14d9f2e94bbf955aa7823d3b1b1
-
SHA512
085b7d3fc09e35c3f55098e9adf94d8d15dcd958a14e0bdb1e05838eb832c1d292fcc0cece53d936bc0600a6f83e74a53a2b9c878207fd0d66a4e3e384b0951c
-
SSDEEP
393216:tlRkNEkZgf8iq1+TtIiFGvvB5IjWqn6eCz1aypX8Wjs+da:NyRbiq1QtIZX3ILn6enyCes+da
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2412 Nuke.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2412 2172 Nuke.exe 28 PID 2172 wrote to memory of 2412 2172 Nuke.exe 28 PID 2172 wrote to memory of 2412 2172 Nuke.exe 28 PID 2384 wrote to memory of 2648 2384 chrome.exe 30 PID 2384 wrote to memory of 2648 2384 chrome.exe 30 PID 2384 wrote to memory of 2648 2384 chrome.exe 30 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2060 2384 chrome.exe 32 PID 2384 wrote to memory of 2108 2384 chrome.exe 33 PID 2384 wrote to memory of 2108 2384 chrome.exe 33 PID 2384 wrote to memory of 2108 2384 chrome.exe 33 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34 PID 2384 wrote to memory of 540 2384 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nuke.exe"C:\Users\Admin\AppData\Local\Temp\Nuke.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Nuke.exe"C:\Users\Admin\AppData\Local\Temp\Nuke.exe"2⤵
- Loads dropped DLL
PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7479758,0x7fef7479768,0x7fef74797782⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:22⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2180 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2192 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1176 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:22⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1240 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1364,i,8551994573052746877,14187285431203204621,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD57327520fdaed6bea366353dd2ec88abc
SHA12a956cd3d24e7d06e4a2725edd525b83a8417533
SHA256cd8cce13a774a55b4c9d8c353cde961932302a0b50a01864a51f91e52c3d58fa
SHA5126ba45fe63a42ea9ac7f0ed1f5d1731dfb7a00ddb9ee35e8145b76cce816e2f6ca165a8a39e9e08d2f03f98f9ca84f0b234d709056c3b38c8686d41118d3c9e80
-
Filesize
1KB
MD5a55189dc8c8979cb444b6fc0a215ae65
SHA155964f0ebf499910a9288664982bc400d0a93746
SHA256a998275676f30a60bb88cacc69c7734647c40f168c40c3094ec5cbb2173f27e9
SHA5123e3fb0becca3f8fbe4d361769113dc1a270f07d2cae553a602e3451fa903f9e274b0323ef2375d66ca19bae15ecfb7d318d50fcd5fb182cf21c0b80d07b60f06
-
Filesize
5KB
MD50e6f507594154d87acfaa95ae73fd8ba
SHA10dcc9881ac6511958a5fc31a24dc1e6828720fed
SHA25606df2f37a9e4f4860032c0143c1d95f72255bb4da228db880f73aa5321ec9012
SHA5129a538d7add483adbcd40453ba9e3007609ad33af0e32027be417f801e096c36aeaaea3d98417b6e544211c255a060b8109fb5376a244923e5bac325105e35d1a
-
Filesize
5KB
MD525ebc21bbc564b64ed29e807a102ea87
SHA13757285feb26fe3199640ef92cc9ae2495c15674
SHA2561a13a633adaac9d3739fe8d305b0fb1566add666a8a1ccc7430525cf07401bae
SHA51235c50d840048d88dd923ff12dcf66c071f33818127f3ca8b7b3f494160213045b2bd0b84767ff06f03eee165a1db79453884c6c74f9caf97eb8fbd93a7a7719e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
5.6MB
MD5451096b13334d75941b3b545724cdb46
SHA1cf46bb9385cab7d125b57a42868d58bfec4a4934
SHA256634cd5bbdfc8ba867bbbab12d5e75fdbba8d0f6086b0e713b56d73d78ae0c7ca
SHA51272d90dc98fd8f5815f72fe1286bdd3626a030f7d043894387e5ae4a6ea46e5d4427c6f3f4468b7f762354c8acd5e8f5bf5d47102eb5e7efda3e0edef6da4a9cc
-
Filesize
4.0MB
MD5dfe014239f32e4354e9612d8a05ae561
SHA1d55f454487bda812562c645a31ffdc0665db2193
SHA2566c2662157e7395fdd54b02f2fb4e4c927087a814217291606e393332ce5a81d4
SHA512e25b7bef63751765bea9ced76c240702036e9ec5d7ce73152207fbc852a1a9724630003beb68eb518ac9b2b4eb5e678066958e98694d94566ddb0e0e443b58f9