Resubmissions

25/07/2024, 14:37

240725-rzbyvatfmn 10

25/07/2024, 14:37

240725-ry8lesxarg 10

25/07/2024, 14:37

240725-ry4mgaxarb 10

25/07/2024, 14:36

240725-ryx5paxaqd 10

25/07/2024, 14:36

240725-rytr9stfkj 10

25/07/2024, 14:36

240725-ryqqlstfjq 10

25/07/2024, 14:36

240725-rymc7axand 10

25/07/2024, 14:35

240725-rydfaaterk 10

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 14:36

General

  • Target

    Nursultan 3.0.exe

  • Size

    347KB

  • MD5

    3500fc8f168c23e6170117e6b779ed52

  • SHA1

    0109abb6ff102e3b8f17bfac07f599d787af8663

  • SHA256

    ed2be8c7b8aa15f1e3bc399b9aaadbdbb16374e0be30d0200d4f39998f1f25a8

  • SHA512

    3d1e2600f1e2b077ab24ed017dee2313f14b34a7c193d8db19a93bb3cc6cd95b620b50c2ab300e958afbeea1fa1d133758664282f60b97b583d748baf056e85f

  • SSDEEP

    6144:igpFNojFilyzigCEcL6hl9he6VlWT8b9G3T8JUKvDbwmb0h6XW:T8Ri4h3hPVle84AWcIeXW

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 14 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nursultan 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Nursultan 3.0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\CMD.exe
      "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Discord" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Discord" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2576
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2140
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Oracle VirtualBox" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdMicrosoft Project.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo 5 /tn "Oracle VirtualBox" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdMicrosoft Project.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        • Suspicious behavior: EnumeratesProcesses
        PID:1520
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        • Suspicious behavior: EnumeratesProcesses
        PID:2824
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        • Suspicious behavior: EnumeratesProcesses
        PID:588
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        • Suspicious behavior: EnumeratesProcesses
        PID:2420
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1768
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2284
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2216
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2076
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1100
    • C:\Windows\system32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
      2⤵
        PID:2948
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1820
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
        2⤵
          PID:2324
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1164
        • C:\Windows\system32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST & exit
          2⤵
            PID:944
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo -1 /tn "Autodesk AutoCAD" /tr "C:\Users\Admin\AppData\Roaming\xdwdMicrosoft SQL Server Management Studio.exe" /RL HIGHEST
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:968
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtASks /deLeTe /F /Tn "Discord" & exit
            2⤵
              PID:1352
              • C:\Windows\system32\schtasks.exe
                schtASks /deLeTe /F /Tn "Discord"
                3⤵
                  PID:2068
              • C:\Windows\system32\CMD.exe
                "CMD" /C taskkill /im explorer.exe /f
                2⤵
                  PID:1788
                  • C:\Windows\system32\taskkill.exe
                    taskkill /im explorer.exe /f
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1768
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtASks /deLeTe /F /Tn "Oracle VirtualBox" & exit
                  2⤵
                    PID:376
                    • C:\Windows\system32\schtasks.exe
                      schtASks /deLeTe /F /Tn "Oracle VirtualBox"
                      3⤵
                        PID:1984
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD02B.tmp.bat""
                      2⤵
                        PID:1652
                        • C:\Windows\system32\timeout.exe
                          timeout 5
                          3⤵
                          • Delays execution with timeout.exe
                          PID:2476
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Modifies registry class
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:580
                        • C:\Windows\system32\taskkill.exe
                          taskkill /im xdwdMicrosoft SQL Server Management Studio.exe /f
                          3⤵
                          • Kills process with taskkill
                          PID:1952
                    • C:\Windows\system32\wbem\WmiApSrv.exe
                      C:\Windows\system32\wbem\WmiApSrv.exe
                      1⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2280
                    • C:\Windows\system32\AUDIODG.EXE
                      C:\Windows\system32\AUDIODG.EXE 0x5d4
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2796

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmpD02B.tmp.bat

                      Filesize

                      292B

                      MD5

                      800125b163ba17394a05db82b208c5fd

                      SHA1

                      0df073685cbb64d7d454f1ae3d9c5884a6f711e5

                      SHA256

                      0e7de7a56818071b334f06bd9cdd4779824d9cf206fbcfa13ee8f4ae003efabe

                      SHA512

                      a64f6c8105b2ed5cbb59a80e2ad54e739bccefd7b8d52c60d33355567e065e64e70a220652eb92c6612acc2710b5dde563eea3f65b2bc8a9897aa2808b39f5b4

                    • C:\Windows\xdwd.dll

                      Filesize

                      136KB

                      MD5

                      16e5a492c9c6ae34c59683be9c51fa31

                      SHA1

                      97031b41f5c56f371c28ae0d62a2df7d585adaba

                      SHA256

                      35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                      SHA512

                      20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                    • memory/588-93-0x000007FEF6FA0000-0x000007FEF6FC2000-memory.dmp

                      Filesize

                      136KB

                    • memory/648-66-0x000007FEF6F70000-0x000007FEF6F92000-memory.dmp

                      Filesize

                      136KB

                    • memory/672-228-0x000007FEF2620000-0x000007FEF2642000-memory.dmp

                      Filesize

                      136KB

                    • memory/876-294-0x000007FEF25A0000-0x000007FEF25C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/944-390-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/968-389-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1100-293-0x000007FEF25A0000-0x000007FEF25C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1164-357-0x000007FEF25A0000-0x000007FEF25C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1272-128-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1520-53-0x000007FEF6FA0000-0x000007FEF6FC2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1768-158-0x000007FEF2620000-0x000007FEF2642000-memory.dmp

                      Filesize

                      136KB

                    • memory/1820-326-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2000-159-0x000007FEF2620000-0x000007FEF2642000-memory.dmp

                      Filesize

                      136KB

                    • memory/2076-260-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2216-227-0x000007FEF2620000-0x000007FEF2642000-memory.dmp

                      Filesize

                      136KB

                    • memory/2220-0-0x000007FEF5273000-0x000007FEF5274000-memory.dmp

                      Filesize

                      4KB

                    • memory/2220-54-0x000007FEF5270000-0x000007FEF5C5C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2220-236-0x000007FEF5270000-0x000007FEF5C5C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2220-74-0x000007FEF5273000-0x000007FEF5274000-memory.dmp

                      Filesize

                      4KB

                    • memory/2220-266-0x00000000003C0000-0x00000000003CC000-memory.dmp

                      Filesize

                      48KB

                    • memory/2220-1-0x0000000000E30000-0x0000000000E8C000-memory.dmp

                      Filesize

                      368KB

                    • memory/2220-425-0x000007FEF5270000-0x000007FEF5C5C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2280-107-0x000007FEF0EE0000-0x000007FEF0F02000-memory.dmp

                      Filesize

                      136KB

                    • memory/2284-190-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2324-359-0x000007FEF25A0000-0x000007FEF25C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2420-126-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2452-94-0x000007FEF6FA0000-0x000007FEF6FC2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2640-261-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2824-65-0x000007FEF6F70000-0x000007FEF6F92000-memory.dmp

                      Filesize

                      136KB

                    • memory/2884-192-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2948-327-0x000007FEF5EC0000-0x000007FEF5EE2000-memory.dmp

                      Filesize

                      136KB