Resubmissions
15/07/2024, 17:03
240715-vk1kfa1ajl 415/07/2024, 17:03
240715-vkpg6szhrk 315/07/2024, 17:00
240715-vh1sestamf 515/07/2024, 16:56
240715-vfnebashpg 315/07/2024, 16:52
240715-vdqfwszfqj 315/07/2024, 16:51
240715-vcsvmazfmm 415/07/2024, 16:50
240715-vcbw4ssgqb 301/07/2024, 15:46
240701-s7pekssapm 301/07/2024, 15:43
240701-s5y61axhpa 401/07/2024, 15:41
240701-s4sylasamj 3Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
NXOV4.2.dll
Resource
win10-20240404-en
General
-
Target
NXOV4.2.dll
-
Size
1.5MB
-
MD5
2fd3f4348ffc36ed2edb18c1c204bd3e
-
SHA1
1295a7987084a4c31a561518b4ea936ba05701eb
-
SHA256
e7c86a734df3942463079883b96930f223b3cd40b501d32c3d143687d546d444
-
SHA512
97fc477cd153ad811ceadc60443af544137fd5197c7ba99f6dc05e19aff3d8d364ab41efdeb87b067327d2f4b331173efe1daed3804d8594bf62e046f5399d73
-
SSDEEP
12288:jWcvWYVU2jcnUh2+gkE+sPIdAfBXjvtQ2U1YMGI:yzUh2+gT+fMfQgI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133655362900179285" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 660 1780 cmd.exe 77 PID 1780 wrote to memory of 660 1780 cmd.exe 77 PID 1780 wrote to memory of 5028 1780 cmd.exe 78 PID 1780 wrote to memory of 5028 1780 cmd.exe 78 PID 3600 wrote to memory of 3916 3600 chrome.exe 81 PID 3600 wrote to memory of 3916 3600 chrome.exe 81 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 1592 3600 chrome.exe 83 PID 3600 wrote to memory of 2296 3600 chrome.exe 84 PID 3600 wrote to memory of 2296 3600 chrome.exe 84 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85 PID 3600 wrote to memory of 1760 3600 chrome.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NXOV4.2.dll,#11⤵PID:2888
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\shutdown.exeshutdown2⤵PID:660
-
-
C:\Windows\system32\help.exehelp2⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd4e479758,0x7ffd4e479768,0x7ffd4e4797782⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:22⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1864 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD54c8156d91944ac84ed20b70ac04f55a9
SHA1c7f97cdf6ea783705dbd31c1a02ac425e2f55beb
SHA2560e45c94a57b58250e1ea8b1c419ff73384b54856a38d6c094def26ee0381a3b7
SHA512d56d7d48eb7b7550b8d04533585e95308addc44ec3a5be03a9acb345decaf5610b0a94746f5a5b6a391264993695aa4b7a81510e937d313f4fe4709a6446d3b7
-
Filesize
5KB
MD5b74c98a7126c04d24e13b1a60e2d1be3
SHA1cb73742020bd88cde3f2cd2f24cde83ad9ce86dd
SHA2564f0c137cb4216c3e717134ab477c95a9ef408b51c4d5b58fa41d40533b3054e7
SHA512a5537a41f9a24c91cc55125fdb9a4a3e5d19bb1a27b2dbc6ee695d408f5dcd75543532b1a9370fea1135d4d1f9008025e38d10d43d2cf703a4d753f7f56dbddb
-
Filesize
12KB
MD52a0db72b7e464182b08003b7d76cb6b9
SHA1846b9829c18a301ff85259a4d27d1df0f28af2f5
SHA25619d60c6160a26f9e34eaee5f1a29e5a1e6944572d81ae6bbb06cf5a4c3d0fa7d
SHA512409bd6e29f51452ed8cc6192cd0a619a3d31cf18e5bb166b57cc7c2ef01f2e67e1706d8726e845a1321ca47a5c6e5afa3be2fc6eaf20c6f4ce79e39698b0a98f
-
Filesize
288KB
MD57a05e69bad50ee5f492ac7f2f3d855c5
SHA1484f163de2eacf7bcd330b7a94b69980fa393728
SHA25605e1ca67aceca8cf972cbe71c9eeb62469b1b7f02e29bc833cc28632e59b14c4
SHA512eb6b9af19e9b7e622524bf5d508e366d95fd861679971daf9612e09b9f0024a101c704cbd10beedf8d2c2852e2f3842c5daa1a208548f4f56955b42813ea5fd1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd