Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe
Resource
win10v2004-20240508-en
General
-
Target
6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe
-
Size
628KB
-
MD5
c3ae34d23bbd2fc33343694d7d6a6861
-
SHA1
814ad69093a7a50606a179ec90a5f76531a6b475
-
SHA256
6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1
-
SHA512
4f924b29636f7b0f1c0011c17842513ff0d8ac9aa1e3856e92065b06df1aa2fb695b8dff9de79ae943b1cbef89bf0ad6e3ccdf2dfe0478b7f66328135d1dbc06
-
SSDEEP
12288:9KfJ8t1DiSIzzpjqXBtuY9nISFTaMIJ056ivgRx78mXadO/BBBBBBBBBBBBBBBB:9KR8t1n2lfY9n5FTrIe40M73XaQH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe -
Executes dropped EXE 6 IoCs
pid Process 5088 NapIeRXN.exe 1540 NapIeRXN.exe 5272 NapIeRXN.exe 5256 NapIeRXN.exe 5596 NapIeRXN.exe 5708 NapIeRXN.exe -
resource yara_rule behavioral2/memory/5708-14806-0x0000000002420000-0x000000000242B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\NapIeRXN.exe 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe File opened for modification C:\Windows\SysWOW64\NapIeRXN.exe 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 set thread context of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2748 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 1540 NapIeRXN.exe 1540 NapIeRXN.exe 5256 NapIeRXN.exe 5256 NapIeRXN.exe 5708 NapIeRXN.exe 5708 NapIeRXN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 1540 NapIeRXN.exe 1540 NapIeRXN.exe 5256 NapIeRXN.exe 5256 NapIeRXN.exe 5708 NapIeRXN.exe 5708 NapIeRXN.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 wrote to memory of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 4376 wrote to memory of 2880 4376 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 92 PID 2880 wrote to memory of 5088 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 98 PID 2880 wrote to memory of 5088 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 98 PID 2880 wrote to memory of 5088 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 98 PID 5088 wrote to memory of 1540 5088 NapIeRXN.exe 99 PID 5088 wrote to memory of 1540 5088 NapIeRXN.exe 99 PID 5088 wrote to memory of 1540 5088 NapIeRXN.exe 99 PID 2880 wrote to memory of 5132 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 101 PID 2880 wrote to memory of 5132 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 101 PID 2880 wrote to memory of 5132 2880 6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe 101 PID 5132 wrote to memory of 2748 5132 cmd.exe 103 PID 5132 wrote to memory of 2748 5132 cmd.exe 103 PID 5132 wrote to memory of 2748 5132 cmd.exe 103 PID 5272 wrote to memory of 5256 5272 NapIeRXN.exe 105 PID 5272 wrote to memory of 5256 5272 NapIeRXN.exe 105 PID 5272 wrote to memory of 5256 5272 NapIeRXN.exe 105 PID 5256 wrote to memory of 5596 5256 NapIeRXN.exe 109 PID 5256 wrote to memory of 5596 5256 NapIeRXN.exe 109 PID 5256 wrote to memory of 5596 5256 NapIeRXN.exe 109 PID 5596 wrote to memory of 5708 5596 NapIeRXN.exe 110 PID 5596 wrote to memory of 5708 5596 NapIeRXN.exe 110 PID 5596 wrote to memory of 5708 5596 NapIeRXN.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe"C:\Users\Admin\AppData\Local\Temp\6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe"C:\Users\Admin\AppData\Local\Temp\6b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\NapIeRXN.exe-auto3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\NapIeRXN.exe-auto4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" cmd/c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\[email protected] > nul3⤵
- Suspicious use of WriteProcessMemory
PID:5132 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2748
-
-
-
-
C:\Windows\SysWOW64\NapIeRXN.exeC:\Windows\SysWOW64\NapIeRXN.exe Service 11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5272 -
C:\Windows\SysWOW64\NapIeRXN.exeC:\Windows\SysWOW64\NapIeRXN.exe Service 12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Windows\SysWOW64\NapIeRXN.exe-a13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5596 -
C:\Windows\SysWOW64\NapIeRXN.exe-a14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5708
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:5932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD5c3ae34d23bbd2fc33343694d7d6a6861
SHA1814ad69093a7a50606a179ec90a5f76531a6b475
SHA2566b0882a13eb3a1f521e6615d06b696ad3a0eef69d77d1820b0ad777b97b6e0f1
SHA5124f924b29636f7b0f1c0011c17842513ff0d8ac9aa1e3856e92065b06df1aa2fb695b8dff9de79ae943b1cbef89bf0ad6e3ccdf2dfe0478b7f66328135d1dbc06