Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 17:44
General
-
Target
NigNig.exe
-
Size
51KB
-
MD5
aaccbc915a130776ef9a56718d85fbc9
-
SHA1
ed7e818ee468b46115c733df5add3ae93d176ed9
-
SHA256
64feddde139d40b6a7194ce93d29f4b9d38598d573f3f51b338938506dde1235
-
SHA512
7461353ab1af04ea6fcdc97a469ebcc64490f2d09ec4031e6658436b07c1dea07da639ea140f9b3d62b4715e1566f1d1e7e6d6d917281f0687de874390554134
-
SSDEEP
768:5ivdjHrddilbVauou79EoKsmqEPBZ6HLBSkGu2yPo+LGZYebFDa9k6RNSgNOcV:CpHmVauo3Jn/ZADj6CSYebFwlf4g
Malware Config
Extracted
xenorat
teaching-wireless.gl.at.ply.gg
nignig_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
39289
-
startup_name
discord
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation NigNig.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 NigNig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2988 schtasks.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2184 3676 NigNig.exe 83 PID 3676 wrote to memory of 2184 3676 NigNig.exe 83 PID 3676 wrote to memory of 2184 3676 NigNig.exe 83 PID 2184 wrote to memory of 2988 2184 NigNig.exe 87 PID 2184 wrote to memory of 2988 2184 NigNig.exe 87 PID 2184 wrote to memory of 2988 2184 NigNig.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NigNig.exe"C:\Users\Admin\AppData\Local\Temp\NigNig.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\NigNig.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\NigNig.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "discord" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BAF.tmp" /F3⤵
- Creates scheduled task(s)
PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
51KB
MD5aaccbc915a130776ef9a56718d85fbc9
SHA1ed7e818ee468b46115c733df5add3ae93d176ed9
SHA25664feddde139d40b6a7194ce93d29f4b9d38598d573f3f51b338938506dde1235
SHA5127461353ab1af04ea6fcdc97a469ebcc64490f2d09ec4031e6658436b07c1dea07da639ea140f9b3d62b4715e1566f1d1e7e6d6d917281f0687de874390554134
-
Filesize
1KB
MD5270a3037e28c41657687de0061e5e719
SHA191e3b4163195d9e90b216e8370e353be45ebe8ba
SHA256b4141c32d58f5e1bd89249a61882db30b8cbf7d8662e3a1da82c8daa6f05b1cb
SHA512b697526a80ae13915c3f984ae7ee229580ef86599a9450e5a56a42a534f6fd4fa366a75f991840f2230591a087cb8c88713abeacf464c2e803674fc720ba80a8