Analysis

  • max time kernel
    39s
  • max time network
    31s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-08-2024 21:21

General

  • Target

    Nyx.exe

  • Size

    4.8MB

  • MD5

    705cd81c1c73cb69a1ddd255464a6d27

  • SHA1

    725db292f972b1f46d70d1e29dba97de100ea78a

  • SHA256

    2788d9bbc9a3f72f224a0674ac0035ceca355d6549eeb2f64ad82dabf7ce9125

  • SHA512

    7ca09167d41e1820deac3397e6520ba2fe703144b4b38a2c7e7f7d4cfc5c495f1b246cc718bf46580f5320c4ccefce9b6c634ea08f2bece4dfceda5b84a17086

  • SSDEEP

    98304:/VPgMPPSCUP71CqUfzfCCArpCl8ioZX80utK8RUgDBepuJc:/VPgsSvIqkfCCQC+f80mK8iZu

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 6 IoCs

    Attempt to gather information on host's network.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nyx.exe
    "C:\Users\Admin\AppData\Local\Temp\Nyx.exe"
    1⤵
    • Loads dropped DLL
    • Checks system information in the registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3540,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=3548 --mojo-platform-channel-handle=3536 /prefetch:2 --host-process-id=4324
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4664
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --field-trial-handle=3604,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=3640 --mojo-platform-channel-handle=3636 /prefetch:3 --host-process-id=4324
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2188
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --field-trial-handle=3692,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=3712 --mojo-platform-channel-handle=3708 /prefetch:8 --host-process-id=4324
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3360
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=renderer --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=5052,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5100 --mojo-platform-channel-handle=5096 --host-process-id=4324 /prefetch:1
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=renderer --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=5060,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5124 --mojo-platform-channel-handle=5112 --host-process-id=4324 /prefetch:1
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --enable-chrome-runtime --user-data-dir="C:\Users\Admin\AppData\Local\Temp\CefSharpCache" --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\lib\resources\cefsharp" --cefsharpexitsub --field-trial-handle=5620,i,16540769886581018193,16697560185213907106,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5636 --mojo-platform-channel-handle=5632 /prefetch:8 --host-process-id=4324
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2328
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
    1⤵
      PID:4592

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CefSharp.Core.Runtime.dll

      Filesize

      1.3MB

      MD5

      41571881b1113b2813d80a8fd063fd18

      SHA1

      8e01d0f9daf636979b09cf3f3bf7235de1be3c81

      SHA256

      e3a9a58317217393ba110b1fd1a7f39c0fb819ce96d425e5d1220e200420938c

      SHA512

      b74c0f0cbe46e9902bd19041fb2f7ded7b1849c790837f29eab250392e612d1fc42767847cb39a2d94fcbf8d528e0ccf25a445d42b26379aaa8de823a1cd0b9b

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\DawnWebGPUCache\data_0

      Filesize

      8KB

      MD5

      cf89d16bb9107c631daabf0c0ee58efb

      SHA1

      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

      SHA256

      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

      SHA512

      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\DawnWebGPUCache\data_1

      Filesize

      264KB

      MD5

      d0d388f3865d0523e451d6ba0be34cc4

      SHA1

      8571c6a52aacc2747c048e3419e5657b74612995

      SHA256

      902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

      SHA512

      376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\DawnWebGPUCache\data_2

      Filesize

      8KB

      MD5

      0962291d6d367570bee5454721c17e11

      SHA1

      59d10a893ef321a706a9255176761366115bedcb

      SHA256

      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

      SHA512

      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\DawnWebGPUCache\data_3

      Filesize

      8KB

      MD5

      41876349cb12d6db992f1309f22df3f0

      SHA1

      5cf26b3420fc0302cd0a71e8d029739b8765be27

      SHA256

      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

      SHA512

      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\Extension Rules\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\Network\SCT Auditing Pending Reports

      Filesize

      2B

      MD5

      d751713988987e9331980363e24189ce

      SHA1

      97d170e1550eee4afc0af065b78cda302a97674c

      SHA256

      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

      SHA512

      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\Preferences

      Filesize

      6KB

      MD5

      090e66a8e729c92d391f1cc33056865d

      SHA1

      90b1351b263440e6b937fca965e7bfe6f8b194a3

      SHA256

      5b9b0e4a9a7fdd9ea70c5b892c7cb14029deb8c96297f62b1fb1c7242ca0c205

      SHA512

      ff01ce2fa3425cbb38f258e30a18c0c025514ddfee857f339e7fa0e73f6d10a1077828a4eb0015d78f73a6d5506699b3f23d63ce2a1b567303b30383e87f6f9b

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\Preferences~RFe583b20.TMP

      Filesize

      6KB

      MD5

      2c0229a8a7d16cba42f3357d03ce8512

      SHA1

      9e9ca9520132e9f2f50827b0d30d8231571f8cf8

      SHA256

      109057b5b2ac45d0444f670702026510333a719fec2ed97fc99f0023ab7bc093

      SHA512

      b8a9e9db50660952a68845a1d972e43e0a72d96d3a50d88d43ad45dea59090431f2b8bf501d82cb5311052584d67231e703b9c0dbe24734e2ac45c8dafa7549a

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Default\shared_proto_db\metadata\MANIFEST-000001

      Filesize

      41B

      MD5

      5af87dfd673ba2115e2fcf5cfdb727ab

      SHA1

      d5b5bbf396dc291274584ef71f444f420b6056f1

      SHA256

      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

      SHA512

      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Local State

      Filesize

      1KB

      MD5

      5c284372f460e8ec55f8e94ade1e26af

      SHA1

      26dda898f2bff13058078ec3db39eed73e1e13b1

      SHA256

      1b9dfb318df7232d7dbdc0867340062fb09b0a40c86f1cb4de5e845f1faf4875

      SHA512

      6e4d2e9c9e1e8fd2438962d7d771f033431243c16ddd1be6586c3e825af0d69c46e382018b77d83b978636117d0cd01ec0535f5fad9dcfc3fe2672f8298dc18e

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Local State

      Filesize

      2KB

      MD5

      96a580e904867b8522fda0fb78e0f271

      SHA1

      767733f1f612e55693181a69d41d8483275f155d

      SHA256

      7a07c00d4d3d7c996b4530bea0841376703b86bf036ed424f9923220c08b9ad5

      SHA512

      cf96e24dd72e62e516d2005f7389b21febcb3e8b56b89d2982909a7f30a272af0859a4b4154de767fb34fed4656f5aff47468ff878384163fda0dd5cd768906c

    • C:\Users\Admin\AppData\Local\Temp\CefSharpCache\Local State~RFe57e1e4.TMP

      Filesize

      890B

      MD5

      a926e464b24385c00ab6db53e3d74f22

      SHA1

      8ad6323dfc4a89ac8ffa93823a5b85f8af3b1ab4

      SHA256

      7356a35e998623261907cc5eeb45fc6312b3a081365598b6468e5eaaa022b4f5

      SHA512

      cb8e9f81277fec917a02f716306e114ca558bf7c1c248ea31a41aba4aaef2337df3bc805d0f9591dfc164505724fb25656ece27a3ef5c01a05fa16ab73d6483d

    • memory/4324-14-0x000000000F180000-0x000000000F212000-memory.dmp

      Filesize

      584KB

    • memory/4324-148-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-18-0x000000000F220000-0x000000000F37C000-memory.dmp

      Filesize

      1.4MB

    • memory/4324-0-0x000000007490E000-0x000000007490F000-memory.dmp

      Filesize

      4KB

    • memory/4324-11-0x000000000E050000-0x000000000E05E000-memory.dmp

      Filesize

      56KB

    • memory/4324-209-0x0000000006F10000-0x0000000006F5F000-memory.dmp

      Filesize

      316KB

    • memory/4324-208-0x00000000073A0000-0x00000000073B4000-memory.dmp

      Filesize

      80KB

    • memory/4324-206-0x0000000006FF0000-0x0000000007058000-memory.dmp

      Filesize

      416KB

    • memory/4324-10-0x000000000E070000-0x000000000E0A8000-memory.dmp

      Filesize

      224KB

    • memory/4324-9-0x000000000DE70000-0x000000000DE78000-memory.dmp

      Filesize

      32KB

    • memory/4324-8-0x00000000093A0000-0x0000000009946000-memory.dmp

      Filesize

      5.6MB

    • memory/4324-7-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-6-0x0000000003480000-0x00000000034CA000-memory.dmp

      Filesize

      296KB

    • memory/4324-5-0x0000000003460000-0x0000000003484000-memory.dmp

      Filesize

      144KB

    • memory/4324-4-0x0000000008150000-0x00000000088B4000-memory.dmp

      Filesize

      7.4MB

    • memory/4324-147-0x000000007490E000-0x000000007490F000-memory.dmp

      Filesize

      4KB

    • memory/4324-146-0x000000000F9A0000-0x000000000FF0F000-memory.dmp

      Filesize

      5.4MB

    • memory/4324-15-0x0000000007F00000-0x0000000007FEC000-memory.dmp

      Filesize

      944KB

    • memory/4324-149-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-150-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-3-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-168-0x0000000014F60000-0x0000000014F71000-memory.dmp

      Filesize

      68KB

    • memory/4324-167-0x0000000015250000-0x00000000152B7000-memory.dmp

      Filesize

      412KB

    • memory/4324-170-0x0000000015FE0000-0x0000000016040000-memory.dmp

      Filesize

      384KB

    • memory/4324-169-0x0000000015F10000-0x0000000015FDC000-memory.dmp

      Filesize

      816KB

    • memory/4324-172-0x00000000070D0000-0x00000000071A8000-memory.dmp

      Filesize

      864KB

    • memory/4324-173-0x00000000071B0000-0x00000000071C5000-memory.dmp

      Filesize

      84KB

    • memory/4324-171-0x00000000150E0000-0x00000000150F9000-memory.dmp

      Filesize

      100KB

    • memory/4324-2-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/4324-1-0x0000000000AE0000-0x0000000000FC0000-memory.dmp

      Filesize

      4.9MB

    • memory/4324-205-0x00000000072B0000-0x0000000007392000-memory.dmp

      Filesize

      904KB

    • memory/4324-207-0x0000000007060000-0x00000000070AA000-memory.dmp

      Filesize

      296KB

    • memory/4664-35-0x0000000000CC0000-0x0000000000CC8000-memory.dmp

      Filesize

      32KB

    • memory/4664-36-0x0000000005550000-0x000000000563B000-memory.dmp

      Filesize

      940KB

    • memory/4664-37-0x0000000005740000-0x000000000578A000-memory.dmp

      Filesize

      296KB