Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 02:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
EvilNominatusCrypto.exe
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
EvilNominatusCrypto.exe
Resource
win10v2004-20240704-en
7 signatures
150 seconds
General
-
Target
EvilNominatusCrypto.exe
-
Size
14KB
-
MD5
8e23d84e5c58270136539c4cb3e604a4
-
SHA1
4cc242e1f24af73d2a3e38e4ad103df0ae62d93c
-
SHA256
01cec0306b25849804ac2770d877423d9f00adfae6217c72842630d18c048ba4
-
SHA512
159cd61686bec5c83c529e69f1ce653c9b8176c386b0d28b192fa25f07c2784749855f27cd144e6c581c37fd411db857c1476777719feb6f6a291bf8acf4344f
-
SSDEEP
384:FAoXJvGfqLzUhT/l85PKDpyE9l5DSvI7irtDZXm:4qBKD5934jrtNX
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EvilNominatusCrypto.exe" EvilNominatusCrypto.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2668 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2372 EvilNominatusCrypto.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2372 EvilNominatusCrypto.exe Token: SeDebugPrivilege 2372 EvilNominatusCrypto.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2856 2372 EvilNominatusCrypto.exe 30 PID 2372 wrote to memory of 2856 2372 EvilNominatusCrypto.exe 30 PID 2372 wrote to memory of 2856 2372 EvilNominatusCrypto.exe 30 PID 2372 wrote to memory of 2856 2372 EvilNominatusCrypto.exe 30 PID 2856 wrote to memory of 2668 2856 cmd.exe 32 PID 2856 wrote to memory of 2668 2856 cmd.exe 32 PID 2856 wrote to memory of 2668 2856 cmd.exe 32 PID 2856 wrote to memory of 2668 2856 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\EvilNominatusCrypto.exe"C:\Users\Admin\AppData\Local\Temp\EvilNominatusCrypto.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2668
-
-