Analysis
-
max time kernel
49s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 02:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
EvilNominatusCrypto.exe
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
EvilNominatusCrypto.exe
Resource
win10v2004-20240704-en
7 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
EvilNominatusCrypto.exe
-
Size
14KB
-
MD5
8e23d84e5c58270136539c4cb3e604a4
-
SHA1
4cc242e1f24af73d2a3e38e4ad103df0ae62d93c
-
SHA256
01cec0306b25849804ac2770d877423d9f00adfae6217c72842630d18c048ba4
-
SHA512
159cd61686bec5c83c529e69f1ce653c9b8176c386b0d28b192fa25f07c2784749855f27cd144e6c581c37fd411db857c1476777719feb6f6a291bf8acf4344f
-
SSDEEP
384:FAoXJvGfqLzUhT/l85PKDpyE9l5DSvI7irtDZXm:4qBKD5934jrtNX
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EvilNominatusCrypto.exe" EvilNominatusCrypto.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation EvilNominatusCrypto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2316 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3448 EvilNominatusCrypto.exe Token: SeDebugPrivilege 3448 EvilNominatusCrypto.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2552 3448 EvilNominatusCrypto.exe 85 PID 3448 wrote to memory of 2552 3448 EvilNominatusCrypto.exe 85 PID 3448 wrote to memory of 2552 3448 EvilNominatusCrypto.exe 85 PID 2552 wrote to memory of 2316 2552 cmd.exe 87 PID 2552 wrote to memory of 2316 2552 cmd.exe 87 PID 2552 wrote to memory of 2316 2552 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\EvilNominatusCrypto.exe"C:\Users\Admin\AppData\Local\Temp\EvilNominatusCrypto.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2316
-
-