Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
d375388acc56c3fb5a358a7fd8642eb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d375388acc56c3fb5a358a7fd8642eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d375388acc56c3fb5a358a7fd8642eb0N.exe
-
Size
3.6MB
-
MD5
d375388acc56c3fb5a358a7fd8642eb0
-
SHA1
2df62fd26c2ba80934f1e27ba01ffef472df79db
-
SHA256
5028e6abfdb57bc2b3086a0e0b8f4d5b9dd8204498ad1c6ef53ed908769d38d1
-
SHA512
e2dc09203426a3b3d079417d6c9ea4bdc29fd982f6ed7e9eedb68828342ffb8568ba0d5f5162c8ad33681cc5d00febe0302119f8d4ed2f683ceb7a3b419b03b8
-
SSDEEP
98304:9Ix6/A08XvhXKqqHclM+X+8dNW1dE82EyPA+oLn:9AaALvh6qGc3XBdKE82w
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\PhotoStageInstall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d375388acc56c3fb5a358a7fd8642eb0N.exe" nchsetup.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 nchsetup.exe -
Loads dropped DLL 4 IoCs
pid Process 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d375388acc56c3fb5a358a7fd8642eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 nchsetup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30 PID 1768 wrote to memory of 2184 1768 d375388acc56c3fb5a358a7fd8642eb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d375388acc56c3fb5a358a7fd8642eb0N.exe"C:\Users\Admin\AppData\Local\Temp\d375388acc56c3fb5a358a7fd8642eb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\d375388acc56c3fb5a358a7fd8642eb0N.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"2⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD550b0df9b3860356ee2e86337bf730510
SHA1b7670b943a6da271587492610653f83e942ab405
SHA256c3a5306282f2129d03c6e6027663986c2b92251abdfc6486eb4d29aef3d8f3cc
SHA51229cf8b55540f20aa583558cab05622e7372d6e3c8cf4f476bb82f969c23926342874911b87f2e11dd45fccdcdaf2c1c844110561eda7468185a60b8500437267