Overview
overview
8Static
static
7bin/admin.bat
windows7-x64
1bin/admin.bat
windows10-2004-x64
7bin/instsvc.bat
windows7-x64
8bin/instsvc.bat
windows10-2004-x64
8bin/ping.bat
windows7-x64
1bin/ping.bat
windows10-2004-x64
7bin/ping.sh
ubuntu-18.04-amd64
1bin/ping.sh
debian-9-armhf
1bin/ping.sh
debian-9-mips
bin/ping.sh
debian-9-mipsel
bin/reset-acl.bat
windows7-x64
1bin/reset-acl.bat
windows10-2004-x64
7bin/reset-acl.sh
ubuntu-18.04-amd64
1bin/reset-acl.sh
debian-9-armhf
1bin/reset-acl.sh
debian-9-mips
bin/reset-acl.sh
debian-9-mipsel
bin/reset-pw.bat
windows7-x64
1bin/reset-pw.bat
windows10-2004-x64
7bin/reset-pw.sh
ubuntu-18.04-amd64
1bin/reset-pw.sh
debian-9-armhf
1bin/reset-pw.sh
debian-9-mips
bin/reset-pw.sh
debian-9-mipsel
bin/shutdown.bat
windows7-x64
1bin/shutdown.bat
windows10-2004-x64
7bin/shutdown.sh
ubuntu-18.04-amd64
1bin/shutdown.sh
debian-9-armhf
1bin/shutdown.sh
debian-9-mips
bin/shutdown.sh
debian-9-mipsel
bin/startup.bat
windows7-x64
1bin/startup.bat
windows10-2004-x64
7bin/startup.sh
ubuntu-18.04-amd64
1bin/startup.sh
debian-9-armhf
1Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 07:42
Behavioral task
behavioral1
Sample
bin/admin.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bin/admin.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
bin/instsvc.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
bin/instsvc.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
bin/ping.bat
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
bin/ping.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
bin/ping.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
bin/ping.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
bin/ping.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
bin/ping.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
bin/reset-acl.bat
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
bin/reset-acl.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
bin/reset-acl.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral14
Sample
bin/reset-acl.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral15
Sample
bin/reset-acl.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral16
Sample
bin/reset-acl.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral17
Sample
bin/reset-pw.bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
bin/reset-pw.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
bin/reset-pw.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral20
Sample
bin/reset-pw.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
bin/reset-pw.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral22
Sample
bin/reset-pw.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
bin/shutdown.bat
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
bin/shutdown.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bin/shutdown.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral26
Sample
bin/shutdown.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral27
Sample
bin/shutdown.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral28
Sample
bin/shutdown.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral29
Sample
bin/startup.bat
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
bin/startup.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
bin/startup.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral32
Sample
bin/startup.sh
Resource
debian9-armhf-20240611-en
General
-
Target
bin/instsvc.bat
-
Size
2KB
-
MD5
21e90735471f64b9b71b37c7d8492574
-
SHA1
05a2effac79c01bcb1f3798b11b542c63588d51c
-
SHA256
b1f3b4370fa8e86d8d86a7ee5dbaccaff73f6fc2f04b5ff43205751d1c152918
-
SHA512
f746d1fb930a77b36a3ffe8823abfcb8e7d81dbcd49e719e33ec82535a7464e4a0cb8df6b6ec5309e2bc7dab3dd21b02041bf88b668dad03c3578be1d2c7e053
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 18 IoCs
pid Process 2600 netsh.exe 2920 netsh.exe 2568 netsh.exe 2484 netsh.exe 2236 netsh.exe 2620 netsh.exe 1056 netsh.exe 2060 netsh.exe 2308 netsh.exe 2668 netsh.exe 2800 netsh.exe 2560 netsh.exe 1740 netsh.exe 2580 netsh.exe 2572 netsh.exe 2452 netsh.exe 2488 netsh.exe 2892 netsh.exe -
resource yara_rule behavioral3/memory/1988-13-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral3/memory/1988-38-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral3/memory/1268-39-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral3/memory/1268-77-0x0000000000400000-0x000000000050A000-memory.dmp upx -
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1988 nxwrapper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2060 2520 cmd.exe 29 PID 2520 wrote to memory of 2060 2520 cmd.exe 29 PID 2520 wrote to memory of 2060 2520 cmd.exe 29 PID 2520 wrote to memory of 2308 2520 cmd.exe 30 PID 2520 wrote to memory of 2308 2520 cmd.exe 30 PID 2520 wrote to memory of 2308 2520 cmd.exe 30 PID 2520 wrote to memory of 2580 2520 cmd.exe 31 PID 2520 wrote to memory of 2580 2520 cmd.exe 31 PID 2520 wrote to memory of 2580 2520 cmd.exe 31 PID 2520 wrote to memory of 2668 2520 cmd.exe 32 PID 2520 wrote to memory of 2668 2520 cmd.exe 32 PID 2520 wrote to memory of 2668 2520 cmd.exe 32 PID 2520 wrote to memory of 2568 2520 cmd.exe 33 PID 2520 wrote to memory of 2568 2520 cmd.exe 33 PID 2520 wrote to memory of 2568 2520 cmd.exe 33 PID 2520 wrote to memory of 2572 2520 cmd.exe 34 PID 2520 wrote to memory of 2572 2520 cmd.exe 34 PID 2520 wrote to memory of 2572 2520 cmd.exe 34 PID 2520 wrote to memory of 2600 2520 cmd.exe 35 PID 2520 wrote to memory of 2600 2520 cmd.exe 35 PID 2520 wrote to memory of 2600 2520 cmd.exe 35 PID 2520 wrote to memory of 2800 2520 cmd.exe 36 PID 2520 wrote to memory of 2800 2520 cmd.exe 36 PID 2520 wrote to memory of 2800 2520 cmd.exe 36 PID 2520 wrote to memory of 2484 2520 cmd.exe 37 PID 2520 wrote to memory of 2484 2520 cmd.exe 37 PID 2520 wrote to memory of 2484 2520 cmd.exe 37 PID 2520 wrote to memory of 2452 2520 cmd.exe 38 PID 2520 wrote to memory of 2452 2520 cmd.exe 38 PID 2520 wrote to memory of 2452 2520 cmd.exe 38 PID 2520 wrote to memory of 2560 2520 cmd.exe 39 PID 2520 wrote to memory of 2560 2520 cmd.exe 39 PID 2520 wrote to memory of 2560 2520 cmd.exe 39 PID 2520 wrote to memory of 2236 2520 cmd.exe 40 PID 2520 wrote to memory of 2236 2520 cmd.exe 40 PID 2520 wrote to memory of 2236 2520 cmd.exe 40 PID 2520 wrote to memory of 2488 2520 cmd.exe 41 PID 2520 wrote to memory of 2488 2520 cmd.exe 41 PID 2520 wrote to memory of 2488 2520 cmd.exe 41 PID 2520 wrote to memory of 2620 2520 cmd.exe 42 PID 2520 wrote to memory of 2620 2520 cmd.exe 42 PID 2520 wrote to memory of 2620 2520 cmd.exe 42 PID 2520 wrote to memory of 2892 2520 cmd.exe 43 PID 2520 wrote to memory of 2892 2520 cmd.exe 43 PID 2520 wrote to memory of 2892 2520 cmd.exe 43 PID 2520 wrote to memory of 2920 2520 cmd.exe 44 PID 2520 wrote to memory of 2920 2520 cmd.exe 44 PID 2520 wrote to memory of 2920 2520 cmd.exe 44 PID 2520 wrote to memory of 1056 2520 cmd.exe 45 PID 2520 wrote to memory of 1056 2520 cmd.exe 45 PID 2520 wrote to memory of 1056 2520 cmd.exe 45 PID 2520 wrote to memory of 1740 2520 cmd.exe 46 PID 2520 wrote to memory of 1740 2520 cmd.exe 46 PID 2520 wrote to memory of 1740 2520 cmd.exe 46 PID 2520 wrote to memory of 1988 2520 cmd.exe 47 PID 2520 wrote to memory of 1988 2520 cmd.exe 47 PID 2520 wrote to memory of 1988 2520 cmd.exe 47 PID 2520 wrote to memory of 1988 2520 cmd.exe 47 PID 2520 wrote to memory of 1312 2520 cmd.exe 48 PID 2520 wrote to memory of 1312 2520 cmd.exe 48 PID 2520 wrote to memory of 1312 2520 cmd.exe 48 PID 1312 wrote to memory of 860 1312 net.exe 49 PID 1312 wrote to memory of 860 1312 net.exe 49 PID 1312 wrote to memory of 860 1312 net.exe 49
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bin\instsvc.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_53_in2⤵
- Modifies Windows Firewall
PID:2060
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_80_in2⤵
- Modifies Windows Firewall
PID:2308
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_443_in2⤵
- Modifies Windows Firewall
PID:2580
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_19002_in2⤵
- Modifies Windows Firewall
PID:2668
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_19003_in2⤵
- Modifies Windows Firewall
PID:2568
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_19004_in2⤵
- Modifies Windows Firewall
PID:2572
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_19003_out2⤵
- Modifies Windows Firewall
PID:2600
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_19004_out2⤵
- Modifies Windows Firewall
PID:2800
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name=NxFilter_1813_in2⤵
- Modifies Windows Firewall
PID:2484
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_53_in protocol=UDP dir=in localport=53 action=allow2⤵
- Modifies Windows Firewall
PID:2452
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_80_in protocol=TCP dir=in localport=80 action=allow2⤵
- Modifies Windows Firewall
PID:2560
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_443_in protocol=TCP dir=in localport=443 action=allow2⤵
- Modifies Windows Firewall
PID:2236
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_19002_in protocol=TCP dir=in localport=19002 action=allow2⤵
- Modifies Windows Firewall
PID:2488
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_19003_in protocol=TCP dir=in localport=19003 action=allow2⤵
- Modifies Windows Firewall
PID:2620
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_19004_in protocol=TCP dir=in localport=19004 action=allow2⤵
- Modifies Windows Firewall
PID:2892
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_19003_out protocol=TCP dir=out remoteport=19003 action=allow2⤵
- Modifies Windows Firewall
PID:2920
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_19004_out protocol=TCP dir=out remoteport=19004 action=allow2⤵
- Modifies Windows Firewall
PID:1056
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name=NxFilter_1813_in protocol=UDP dir=in localport=1813 action=allow2⤵
- Modifies Windows Firewall
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\nxwrapper.exenxwrapper.exe --startup=auto install2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1988
-
-
C:\Windows\system32\net.exenet start NxFilter2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start NxFilter3⤵PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\nxwrapper.exe"C:\Users\Admin\AppData\Local\Temp\nxwrapper.exe"1⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo %PATH%2⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:/Users/Admin/AppData/Local/Temp/bin/startup.bat"2⤵PID:596
-