Overview
overview
10Static
static
1readme.zip
windows7-x64
1readme.zip
windows10-2004-x64
1AudioCapture.dll
windows7-x64
1AudioCapture.dll
windows10-2004-x64
1HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
3NSM.lic
windows7-x64
3NSM.lic
windows10-2004-x64
3PCICHEK.dll
windows7-x64
1PCICHEK.dll
windows10-2004-x64
1TCCTL32.dll
windows7-x64
1TCCTL32.dll
windows10-2004-x64
1client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10client32.ini
windows7-x64
1client32.ini
windows10-2004-x64
1msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3nskbfltr.inf
windows7-x64
1nskbfltr.inf
windows10-2004-x64
1nsm_vpro.ini
windows7-x64
1nsm_vpro.ini
windows10-2004-x64
1pcicapi.dll
windows7-x64
1pcicapi.dll
windows10-2004-x64
1pcicl32.dll
windows7-x64
1pcicl32.dll
windows10-2004-x64
1remcmdstub.exe
windows7-x64
1remcmdstub.exe
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
readme.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
readme.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
AudioCapture.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AudioCapture.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
HTCTL32.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
HTCTL32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
NSM.lic
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
NSM.lic
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
PCICHEK.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TCCTL32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
TCCTL32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
client32.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
client32.ini
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
client32.ini
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
msvcr100.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
nskbfltr.inf
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
nskbfltr.inf
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
nsm_vpro.ini
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
nsm_vpro.ini
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
pcicapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
pcicapi.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
pcicl32.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
pcicl32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
remcmdstub.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
remcmdstub.exe
Resource
win10v2004-20240709-en
General
-
Target
NSM.lic
-
Size
259B
-
MD5
3a88847f4bbf7199a2161ed963fe88ef
-
SHA1
8629803adb6af84691dc5431b6590df14bad4a61
-
SHA256
a680947aba5cf3316be50f1ec6a0d8bf72f7d7ca79d91430c26e24680eddd35e
-
SHA512
2b6408e7334946655045914b2cfa14dcfb39502f64ffafad784717a8ca036b73928bd7a5b02d650d8698357c54c31cac11a705baed0e1e7a3a07d659a2104e02
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.lic rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\lic_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.lic\ = "lic_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 AcroRd32.exe 2648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2600 2356 cmd.exe 31 PID 2356 wrote to memory of 2600 2356 cmd.exe 31 PID 2356 wrote to memory of 2600 2356 cmd.exe 31 PID 2600 wrote to memory of 2648 2600 rundll32.exe 32 PID 2600 wrote to memory of 2648 2600 rundll32.exe 32 PID 2600 wrote to memory of 2648 2600 rundll32.exe 32 PID 2600 wrote to memory of 2648 2600 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NSM.lic1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NSM.lic2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NSM.lic"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5afe421f42ee1e1f14429bceb138401f9
SHA107679542f68c6fde31063703f74ecb2ba0254b6d
SHA256839ad8a4315639a9de2061fbdd84097da96e1c50fc812fae01af02b49a0a0b76
SHA512593a01154e380363cd332856c1415566333148db5e5fec1572fba5ea005a8252f8e69c08a8165f01835deba842f492f08ea5cfe981b13255d1f6394122b29450