Overview
overview
3Static
static
3Netti-Nuker-main.zip
windows7-x64
1Netti-Nuker-main.zip
windows10-2004-x64
1Netti-Nuke...DME.md
windows7-x64
3Netti-Nuke...DME.md
windows10-2004-x64
3Netti-Nuke...11.pyc
windows7-x64
3Netti-Nuke...11.pyc
windows10-2004-x64
3Netti-Nuke...fig.py
windows7-x64
3Netti-Nuke...fig.py
windows10-2004-x64
3Netti-Nuke...ain.py
windows7-x64
3Netti-Nuke...ain.py
windows10-2004-x64
3Netti-Nuke...t__.py
windows7-x64
3Netti-Nuke...t__.py
windows10-2004-x64
3Netti-Nuke...11.pyc
windows7-x64
3Netti-Nuke...11.pyc
windows10-2004-x64
3Netti-Nuke...me.dll
windows7-x64
1Netti-Nuke...me.dll
windows10-2004-x64
1Netti-Nuke...ts.txt
windows7-x64
1Netti-Nuke...ts.txt
windows10-2004-x64
1Netti-Nuke...rt.bat
windows7-x64
1Netti-Nuke...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
Netti-Nuker-main.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Netti-Nuker-main.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Netti-Nuker-main/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Netti-Nuker-main/README.md
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Netti-Nuker-main/__pycache__/config.cpython-311.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Netti-Nuker-main/__pycache__/config.cpython-311.pyc
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Netti-Nuker-main/config.py
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Netti-Nuker-main/config.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Netti-Nuker-main/main.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Netti-Nuker-main/main.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Netti-Nuker-main/pyarmor_runtime_000000/__init__.py
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Netti-Nuker-main/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Netti-Nuker-main/pyarmor_runtime_000000/__pycache__/__init__.cpython-311.pyc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Netti-Nuker-main/pyarmor_runtime_000000/__pycache__/__init__.cpython-311.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Netti-Nuker-main/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
Netti-Nuker-main/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
Netti-Nuker-main/requirements.txt
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Netti-Nuker-main/requirements.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
Netti-Nuker-main/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Netti-Nuker-main/start.bat
Resource
win10v2004-20240419-en
General
-
Target
Netti-Nuker-main/config.py
-
Size
184B
-
MD5
609deb87ad4014e5bb705700fee4de6a
-
SHA1
6864320e3cd154b3daf5b3ca65bf45a6d7b5bd14
-
SHA256
95c40f3aa689a427284f977bd2c229e816dea97719e6f72a113db3c4e1b5d1cf
-
SHA512
9fd35584b8ab965463a06e170ca274b4331568d7f12ef55d7c6b4a54582d6d1af787654de71249e22e32e6273c40fe08fc403a9fee17f594c2e460e5f81f17d8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2628 AcroRd32.exe 2628 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2792 2896 cmd.exe 29 PID 2896 wrote to memory of 2792 2896 cmd.exe 29 PID 2896 wrote to memory of 2792 2896 cmd.exe 29 PID 2792 wrote to memory of 2628 2792 rundll32.exe 30 PID 2792 wrote to memory of 2628 2792 rundll32.exe 30 PID 2792 wrote to memory of 2628 2792 rundll32.exe 30 PID 2792 wrote to memory of 2628 2792 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bed2d7b21801e61aaf150c5d45c763d2
SHA1a053b535856becc7ee488d5d8a4d5867b96a1200
SHA2566b1d5e60f8e021f64ff84944f04ba0e02be96024c2ef1a234666df2742019c20
SHA512bb70ca37829e375dfa7c95eafff9955c0e07b0c7f5de2a15ae8664ee5671d04618c92446aaca41dd7ef9ae9433ae16917e9fa9e85e0fcdab8420582412cc4d8c