Overview
overview
7Static
static
3EOSSDK-Win...ng.dll
windows10-2004-x64
3OpenAL32.dll
windows10-2004-x64
1discord_game_sdk.dll
windows10-2004-x64
1nvmp/CrashRpt1403.dll
windows10-2004-x64
1nvmp/Crash...03.exe
windows10-2004-x64
1nvmp/client.dll
windows10-2004-x64
1nvmp/res/r...86.exe
windows10-2004-x64
7nvmp/steam_api.dll
windows10-2004-x64
1nvmp_launcher.exe
windows10-2004-x64
3nvmp_start.exe
windows10-2004-x64
1nvmp_storyserver.exe
windows10-2004-x64
1Analysis
-
max time kernel
298s -
max time network
281s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
EOSSDK-Win32-Shipping.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
OpenAL32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
discord_game_sdk.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
nvmp/CrashRpt1403.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
nvmp/CrashSender1403.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
nvmp/client.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
nvmp/res/redist/vc_redist.x86.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
nvmp/steam_api.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
nvmp_launcher.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
nvmp_start.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
nvmp_storyserver.exe
Resource
win10v2004-20240412-en
General
-
Target
nvmp_launcher.exe
-
Size
9.7MB
-
MD5
886d084da50d4acffd0a4741a599bedd
-
SHA1
d5cfbcc697fc92aebf5baf50325235f42759686d
-
SHA256
0a7f2571b6ce3c0106a23b9db6ab102fd222821ba6bca23a77df9c0608c4a95f
-
SHA512
54db14ba1c993720eac9c9a8af314e4733fa748b0e10a1f3b6986c631a17c412e2c4cc8d5e96ae09d8daf26bc7af362818e4ee10501698ac47a795c9dc3556af
-
SSDEEP
196608:9r798tO8AZ0cmLkNL16Sp7negpg9GTNS5zB/oM66:9mML0cwkNAQegWGTNOzdoj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ nvmp_launcher.exe Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ nvmp_launcher.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4804 nvmp_launcher.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4804 nvmp_launcher.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4804 nvmp_launcher.exe Token: SeManageVolumePrivilege 4636 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nvmp_launcher.exe"C:\Users\Admin\AppData\Local\Temp\nvmp_launcher.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4636