Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 12:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NPLoader.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NPLoader.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
NPLoader.exe
-
Size
11.8MB
-
MD5
97f3bcb4bbe689cf6c389a655fc1dff9
-
SHA1
496eb7022d33177493a7600c9a2f8ef7ed262081
-
SHA256
cd4d052237893068f83ba8d073f95217dbe96c4a0373cf17427203c796cf6565
-
SHA512
7c42cb431b6e9998911070eb606e0d1e9db56b734f10167d72c15c24ec302c7d8d699035885e6b9ddd1592fa3095e16a2594a000b06a636a7e6fe74481b25981
-
SSDEEP
196608:gLygabBD8w5H2U3TSj/CzFkBdHtIT2qHNzJPKzTdAGebLqMAp0NMS6AXkrL3XnO7:gegabeAmj/CzFkLNIT2clJSzT6G2Lr6V
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1192 NPLoader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 NPLoader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1972 1192 NPLoader.exe 29 PID 1192 wrote to memory of 1972 1192 NPLoader.exe 29 PID 1192 wrote to memory of 1972 1192 NPLoader.exe 29 PID 1972 wrote to memory of 2936 1972 cmd.exe 30 PID 1972 wrote to memory of 2936 1972 cmd.exe 30 PID 1972 wrote to memory of 2936 1972 cmd.exe 30 PID 1972 wrote to memory of 2548 1972 cmd.exe 31 PID 1972 wrote to memory of 2548 1972 cmd.exe 31 PID 1972 wrote to memory of 2548 1972 cmd.exe 31 PID 1972 wrote to memory of 2092 1972 cmd.exe 32 PID 1972 wrote to memory of 2092 1972 cmd.exe 32 PID 1972 wrote to memory of 2092 1972 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NPLoader.exe"C:\Users\Admin\AppData\Local\Temp\NPLoader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\NPLoader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\NPLoader.exe" MD53⤵PID:2936
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2548
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2092
-
-