Resubmissions
15/06/2024, 04:04
240615-em1efsycrd 915/06/2024, 04:02
240615-ematssscrr 915/06/2024, 04:00
240615-eksa3ascnj 315/06/2024, 03:58
240615-ejj83ascjr 9Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
NiggaSploit.gz
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
NiggaSploit.gz
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
SolaraB2/SolaraBootstrapper.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
SolaraB2/SolaraBootstrapper.exe
Resource
win10v2004-20240508-en
General
-
Target
NiggaSploit.gz
-
Size
278KB
-
MD5
fb44663383577e72cb1d59c6a16adfe2
-
SHA1
1c33fffe182c18a17cc6fc1f6fe4a89bead052ed
-
SHA256
1590e2efd5142338b56790e0bd492b5c117078dc60cfcb57c77127839acfd0e9
-
SHA512
18e5b619a527b835cf122c024dbb974eed0078e6fc4ae697b880b2e45476a3dc56523c2c4bad334f915b1db97988b80c34769af6443f77e77437a7c68c8f4cc2
-
SSDEEP
6144:SAsnviz4uS0NLr42O0Lo7c94nLbr+oUKkBDV6MfmAP:SAoq8uS0ZGI+n/r+TDsMfmk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2996 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4156 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2996 4156 OpenWith.exe 105 PID 4156 wrote to memory of 2996 4156 OpenWith.exe 105
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NiggaSploit.gz1⤵
- Modifies registry class
PID:4540
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\NiggaSploit.gz2⤵
- Opens file in notepad (likely ransom note)
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1288,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=3936 /prefetch:81⤵PID:2908