Resubmissions

15/07/2024, 17:03

240715-vk1kfa1ajl 4

15/07/2024, 17:03

240715-vkpg6szhrk 3

15/07/2024, 17:00

240715-vh1sestamf 5

15/07/2024, 16:56

240715-vfnebashpg 3

15/07/2024, 16:52

240715-vdqfwszfqj 3

15/07/2024, 16:51

240715-vcsvmazfmm 4

15/07/2024, 16:50

240715-vcbw4ssgqb 3

01/07/2024, 15:46

240701-s7pekssapm 3

01/07/2024, 15:43

240701-s5y61axhpa 4

01/07/2024, 15:41

240701-s4sylasamj 3

Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/07/2024, 16:56

General

  • Target

    NXOV4.2.dll

  • Size

    1.5MB

  • MD5

    2fd3f4348ffc36ed2edb18c1c204bd3e

  • SHA1

    1295a7987084a4c31a561518b4ea936ba05701eb

  • SHA256

    e7c86a734df3942463079883b96930f223b3cd40b501d32c3d143687d546d444

  • SHA512

    97fc477cd153ad811ceadc60443af544137fd5197c7ba99f6dc05e19aff3d8d364ab41efdeb87b067327d2f4b331173efe1daed3804d8594bf62e046f5399d73

  • SSDEEP

    12288:jWcvWYVU2jcnUh2+gkE+sPIdAfBXjvtQ2U1YMGI:yzUh2+gT+fMfQgI

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\NXOV4.2.dll,#1
    1⤵
      PID:2888
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\system32\shutdown.exe
        shutdown
        2⤵
          PID:660
        • C:\Windows\system32\help.exe
          help
          2⤵
            PID:5028
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3600
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd4e479758,0x7ffd4e479768,0x7ffd4e479778
            2⤵
              PID:3916
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:2
              2⤵
                PID:1592
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1864 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:8
                2⤵
                  PID:2296
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:8
                  2⤵
                    PID:1760
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:1
                    2⤵
                      PID:4200
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:1
                      2⤵
                        PID:792
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:1
                        2⤵
                          PID:2224
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:8
                          2⤵
                            PID:2956
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:8
                            2⤵
                              PID:1248
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1800,i,9401450763181058218,3624907056634227544,131072 /prefetch:8
                              2⤵
                                PID:4192
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2480

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                4c8156d91944ac84ed20b70ac04f55a9

                                SHA1

                                c7f97cdf6ea783705dbd31c1a02ac425e2f55beb

                                SHA256

                                0e45c94a57b58250e1ea8b1c419ff73384b54856a38d6c094def26ee0381a3b7

                                SHA512

                                d56d7d48eb7b7550b8d04533585e95308addc44ec3a5be03a9acb345decaf5610b0a94746f5a5b6a391264993695aa4b7a81510e937d313f4fe4709a6446d3b7

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                b74c98a7126c04d24e13b1a60e2d1be3

                                SHA1

                                cb73742020bd88cde3f2cd2f24cde83ad9ce86dd

                                SHA256

                                4f0c137cb4216c3e717134ab477c95a9ef408b51c4d5b58fa41d40533b3054e7

                                SHA512

                                a5537a41f9a24c91cc55125fdb9a4a3e5d19bb1a27b2dbc6ee695d408f5dcd75543532b1a9370fea1135d4d1f9008025e38d10d43d2cf703a4d753f7f56dbddb

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                12KB

                                MD5

                                2a0db72b7e464182b08003b7d76cb6b9

                                SHA1

                                846b9829c18a301ff85259a4d27d1df0f28af2f5

                                SHA256

                                19d60c6160a26f9e34eaee5f1a29e5a1e6944572d81ae6bbb06cf5a4c3d0fa7d

                                SHA512

                                409bd6e29f51452ed8cc6192cd0a619a3d31cf18e5bb166b57cc7c2ef01f2e67e1706d8726e845a1321ca47a5c6e5afa3be2fc6eaf20c6f4ce79e39698b0a98f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                288KB

                                MD5

                                7a05e69bad50ee5f492ac7f2f3d855c5

                                SHA1

                                484f163de2eacf7bcd330b7a94b69980fa393728

                                SHA256

                                05e1ca67aceca8cf972cbe71c9eeb62469b1b7f02e29bc833cc28632e59b14c4

                                SHA512

                                eb6b9af19e9b7e622524bf5d508e366d95fd861679971daf9612e09b9f0024a101c704cbd10beedf8d2c2852e2f3842c5daa1a208548f4f56955b42813ea5fd1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd