Analysis
-
max time kernel
90s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-04-2024 17:38
Behavioral task
behavioral1
Sample
nignig.exe
Resource
win10v2004-20240419-en
General
-
Target
nignig.exe
-
Size
51KB
-
MD5
2553697d3450b13cc2d7cd0c65ef609f
-
SHA1
a6954b0309a0e3cd1186c174beff53e5cbd05e64
-
SHA256
2967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
-
SHA512
204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
SSDEEP
768:tivdjHrddilbVauou79Eo32q4XBR2HjBSkGu2yPo+LGZYebFDaxk6RNSgNOU:+pHmVauo3DjRUDj6CSYebFUlf4U
Malware Config
Extracted
xenorat
centre-clan.gl.at.ply.gg
nignig_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
40354
-
startup_name
discord
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 252 nignig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe 252 nignig.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 252 nignig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3564 wrote to memory of 252 3564 nignig.exe 80 PID 3564 wrote to memory of 252 3564 nignig.exe 80 PID 3564 wrote to memory of 252 3564 nignig.exe 80 PID 252 wrote to memory of 572 252 nignig.exe 81 PID 252 wrote to memory of 572 252 nignig.exe 81 PID 252 wrote to memory of 572 252 nignig.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\nignig.exe"C:\Users\Admin\AppData\Local\Temp\nignig.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\nignig.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\nignig.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:252 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "discord" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6765.tmp" /F3⤵
- Creates scheduled task(s)
PID:572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
51KB
MD52553697d3450b13cc2d7cd0c65ef609f
SHA1a6954b0309a0e3cd1186c174beff53e5cbd05e64
SHA2562967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
SHA512204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
Filesize
1KB
MD5648afa83e3dbfbb5b7f97fd39a29f4f7
SHA1fdabd58126c64246501deb458706a5e474eae04d
SHA256106aa526ff18e9713b5f8da66fb27459fdbd3580e9d72372ae0461523fd9eb26
SHA51216eba1b1a5b156f02bf891769f90562a022d1a047bb691cc179716b81cf8776e860ac76f0552a0998afb5e8b73c5490ca0706d04ebd4307be882d993d7af1026