Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
Resource
win10v2004-20240508-en
General
-
Target
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
-
Size
53KB
-
MD5
270a54ac62ff763a211a155193a6f2c9
-
SHA1
6626745f64be1af8dc9f19bee738074f0f345a74
-
SHA256
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365
-
SHA512
9b6e12ffdcb5679fe17d65b49ccb8e0c465a0cd90a7ca98c6ba87b8a58c6180dac84808bbfcc6521350750b482a5dc45c65fc2a53c2daf131726937917db01d4
-
SSDEEP
1536:vN/g8r8QeC8pFWMC7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:AC8T9CJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nioupo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe -
Executes dropped EXE 1 IoCs
pid Process 4112 nioupo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nioupo = "C:\\Users\\Admin\\nioupo.exe" nioupo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe 4112 nioupo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4416 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 4112 nioupo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4112 4416 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 95 PID 4416 wrote to memory of 4112 4416 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 95 PID 4416 wrote to memory of 4112 4416 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 95 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90 PID 4112 wrote to memory of 4416 4112 nioupo.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe"C:\Users\Admin\AppData\Local\Temp\72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\nioupo.exe"C:\Users\Admin\nioupo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3644,i,14648456027158448592,4956305794400220180,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:81⤵PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD54e16f0f3326bb4e174fe7349987199da
SHA1bb9ff3107acd26cf55d10a829873a3f806e3eb21
SHA256c28fe94a51242a5682c7a1e81e52cc267786fa7ad36a0cd7a23bfae197c799c3
SHA512aa724d4b12e87fb0492703829c4fc09da0bf2ebdfa1546c420fb7ad8e6f54a9a5231cab4137e96004671b13b13110accfb3d5426561e52cbd60057a2f637b809