Overview
overview
3Static
static
3nevermisscc.rar
windows7-x64
3nevermisscc.rar
windows10-2004-x64
3nevermissc...a.json
windows7-x64
3nevermissc...a.json
windows10-2004-x64
3nevermissc...20.txt
windows7-x64
1nevermissc...20.txt
windows10-2004-x64
1nevermissc...er.exe
windows7-x64
1nevermissc...er.exe
windows10-2004-x64
1nevermissc...pd.exe
windows7-x64
1nevermissc...pd.exe
windows10-2004-x64
1nevermissc...me.txt
windows7-x64
1nevermissc...me.txt
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
nevermisscc.rar
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
nevermisscc.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
nevermisscc/extra.json
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
nevermisscc/extra.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
nevermisscc/logs/log2024-06-25_01-49-20.txt
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
nevermisscc/logs/log2024-06-25_01-49-20.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
nevermisscc/mapper.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nevermisscc/mapper.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
nevermisscc/nevermissupd.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
nevermisscc/nevermissupd.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
nevermisscc/readme.txt
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
nevermisscc/readme.txt
Resource
win10v2004-20240611-en
General
-
Target
nevermisscc/extra.json
-
Size
29B
-
MD5
7067770bbafc954dbd1c55814d1adac0
-
SHA1
8b20e2f8555bbf69cde300c37110f9c902a29ab0
-
SHA256
6da26ad13980cc58fd545c657415f15e440dddb447c90cca07dd4b54a6ff9c32
-
SHA512
46df78d785a7b3a885aca1e0e5b37ae8b8270afa2d30cd3a3acd5a24f6c504bbd68d83ba15462d22579d8b25d462fa08817d40f8bfa78b7cc5a23e149484d7a6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3012 1264 cmd.exe 29 PID 1264 wrote to memory of 3012 1264 cmd.exe 29 PID 1264 wrote to memory of 3012 1264 cmd.exe 29 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\nevermisscc\extra.json1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\nevermisscc\extra.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\nevermisscc\extra.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59b4158a3d50262320db4614647230759
SHA1f6b714228caf23d6d89e911b06774e909b5a8c40
SHA25669d8d922fe812c33e53268a13d1e7d48dde25c5626cfb43295b7461d7dc7907d
SHA512d81e044de0f159bfbc7f05496255771d830b6c0a2b73a5744fd5b0d139cac76d2b7f992316a21b56f65b1b092e04b7b3203da78b0b856154f2beed36c0cbfbab