Overview
overview
10Static
static
3Nursultan_...24.zip
windows10-1703-x64
1NursultanN...AL.dll
windows10-1703-x64
1NursultanN...64.dll
windows10-1703-x64
1NursultanN...ts.rar
windows10-1703-x64
304/04933f2...bdce8c
windows10-1703-x64
104/049a304...8de39b
windows10-1703-x64
104/04c43a7...8b9f8a
windows10-1703-x64
104/04d00bc...51c55d
windows10-1703-x64
104/04d181f...624ab2
windows10-1703-x64
104/04de7b3...57ff7f
windows10-1703-x64
1004/04f5636...23aa7a
windows10-1703-x64
104/3d0cb49...я (3)
windows10-1703-x64
104/3d0cb49...пия
windows10-1703-x64
104/3d0cb49...я (4)
windows10-1703-x64
104/3d0cb49...пия
windows10-1703-x64
1NursultanN...oc.dll
windows10-1703-x64
1NursultanN...gl.dll
windows10-1703-x64
1NursultanN...gl.dll
windows10-1703-x64
1NursultanN...tb.dll
windows10-1703-x64
1NursultanN...ft.jar
windows10-1703-x64
7NursultanN...es.rar
windows10-1703-x64
3natives/Nursultan.dll
windows10-1703-x64
5natives/OpenAL.dll
windows10-1703-x64
1natives/SA...64.dll
windows10-1703-x64
1natives/glfw.dll
windows10-1703-x64
1natives/jemalloc.dll
windows10-1703-x64
1natives/lwjgl.dll
windows10-1703-x64
1natives/lw...gl.dll
windows10-1703-x64
1natives/lwjgl_stb.dll
windows10-1703-x64
1natives/lw...fd.dll
windows10-1703-x64
1NursultanN...AR.exe
windows10-1703-x64
3NursultanN...rt.bat
windows10-1703-x64
10Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-06-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan_FREE_2024.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NursultanNextgen2024/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
NursultanNextgen2024/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
NursultanNextgen2024/assets.rar
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
04/04933f2f39e339e7ba0db0c21812cb9ff9bdce8c
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
04/049a3049a5ac8631a6c5f367b7d824fc0d8de39b
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
04/04c43a7a9b7883538080f84bf5b4bcba0c8b9f8a
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
04/04d00bc852751498fad759fe473fef917b51c55d
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
04/04d181f5f4d61d2215175a1e63e7caaf9b624ab2
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
04/04de7b3f382c41f8bfa36ea205f3ae807457ff7f
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
04/04f5636909319c54405c20ff932d92397523aa7a
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
04/3d0cb49d33b9bb2462ad183f65e2e11aea3c1eff — копия (3)
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
04/3d0cb49d33b9bb2462ad183f65e2e11aea3c1eff — копия (3) — копия
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
04/3d0cb49d33b9bb2462ad183f65e2e11aea3c1eff — копия (4)
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
04/3d0cb49d33b9bb2462ad183f65e2e11aea3c1eff — копия (4) — копия
Resource
win10-20240611-en
Behavioral task
behavioral16
Sample
NursultanNextgen2024/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
NursultanNextgen2024/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
NursultanNextgen2024/lwjgl_opengl.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
NursultanNextgen2024/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
NursultanNextgen2024/minecraft.jar
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
NursultanNextgen2024/natives.rar
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
natives/Nursultan.dll
Resource
win10-20240611-en
Behavioral task
behavioral23
Sample
natives/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
natives/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
natives/glfw.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
natives/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
natives/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
natives/lwjgl_opengl.dll
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
natives/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
natives/lwjgl_tinyfd.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
NursultanNextgen2024/rar/UnRAR.exe
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
NursultanNextgen2024/start.bat
Resource
win10-20240404-en
General
-
Target
NursultanNextgen2024/minecraft.jar
-
Size
36.6MB
-
MD5
1bc56c1c09bb5d108365c0992291f5c6
-
SHA1
7c47e8db8b527b256520499033f0c39ab2fee449
-
SHA256
15788f4491bbaefd419c7a152a2ce35e59ad827218260a10430a2fcf23e30cf6
-
SHA512
a283f96cc878a88125cdb1e959f17044ddcb4031e566f4a3273012e4cbfc568004b2a25c54896b104fe0ede950193b518f6be283de260679871e8860ea88c86d
-
SSDEEP
786432:J67l/W65D0Dspv3aagZb+1VBy3W8B4YrA2ysrjAAi81iVZV6zihX1:el/94Y93gb+1VAP4YrA2y5AnCZVrf
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 788 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 508 wrote to memory of 788 508 java.exe 77 PID 508 wrote to memory of 788 508 java.exe 77
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\NursultanNextgen2024\minecraft.jar1⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:788
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:200
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000070218 /startuptips1⤵
- Checks SCSI registry key(s)
PID:204
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD555324ec7b6e94a910826bc794b4a8900
SHA16669ef463409c88ca4f9c4307c9cb38ad982dd1e
SHA25632c0dc5b11d19ec461a1dfada26bc54db94e05e759b138dafcec1f8fff6ed5e3
SHA5128232de84138dd668ec05776db5800c2695e614b40471d428f794b7f801e8f2cd208ef0bf739a2ad6e45ab81cbdb57ed40ad311d4baec3d13bac22281c905941f
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c