Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 20:03
General
-
Target
nignigrat.exe
-
Size
51KB
-
MD5
2553697d3450b13cc2d7cd0c65ef609f
-
SHA1
a6954b0309a0e3cd1186c174beff53e5cbd05e64
-
SHA256
2967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
-
SHA512
204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
SSDEEP
768:tivdjHrddilbVauou79Eo32q4XBR2HjBSkGu2yPo+LGZYebFDaxk6RNSgNOU:+pHmVauo3DjRUDj6CSYebFUlf4U
Malware Config
Extracted
xenorat
centre-clan.gl.at.ply.gg
nignig_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
40354
-
startup_name
discord
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation nignigrat.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 nignigrat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1940 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1220 wrote to memory of 5084 1220 nignigrat.exe 84 PID 1220 wrote to memory of 5084 1220 nignigrat.exe 84 PID 1220 wrote to memory of 5084 1220 nignigrat.exe 84 PID 5084 wrote to memory of 1940 5084 nignigrat.exe 95 PID 5084 wrote to memory of 1940 5084 nignigrat.exe 95 PID 5084 wrote to memory of 1940 5084 nignigrat.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\nignigrat.exe"C:\Users\Admin\AppData\Local\Temp\nignigrat.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\nignigrat.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\nignigrat.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "discord" /XML "C:\Users\Admin\AppData\Local\Temp\tmp469E.tmp" /F3⤵
- Creates scheduled task(s)
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
51KB
MD52553697d3450b13cc2d7cd0c65ef609f
SHA1a6954b0309a0e3cd1186c174beff53e5cbd05e64
SHA2562967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
SHA512204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
Filesize
1KB
MD5c1207d4065ce8ab8a66c6b759e145416
SHA11a1a14ce843898e175f67befa03a75ad2953cbe9
SHA2566d79e2caecb684420b99340cac053d33948338546de2791baabfe4b51896fda7
SHA51276991db460a7d3b51ec231387c4491b82c13bc6e60d3e80889cd1e6206b05cec9568c13fee402aab3b6e2b84bb8ba05f750e2985eb47558d6b47065b180ab4d2