Analysis
-
max time kernel
144s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 16:29
Behavioral task
behavioral1
Sample
Nikita.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nikita.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nikita/Lua.Kb2.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Nikita/Lua.Kb2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nikita/Nikita.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Nikita/Nikita.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
��%�J�w.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
��%�J�w.pyc
Resource
win10v2004-20240802-en
General
-
Target
Nikita.rar
-
Size
6.7MB
-
MD5
a63d54b86ba71e9725a3ba5c73894bb5
-
SHA1
f38f45a84c967da3db55540ac9ca2e1f78f834bb
-
SHA256
d7faca4503dbcf15254bf50daf808e675522d9bf2047799a0b8b72a51533ce0e
-
SHA512
cf2811caeeb037e4c769628db816804c134ec1e02254aaf0de9018515a9d0cad79a902e4be7be43f00f42bea838d2a06f40e2f2aedd1557cf8886a80bb4083ed
-
SSDEEP
196608:Jcg2ylA+VCoAHQyrTT0HSkYYjZ1Vq1/SIiDzN:ZDo13virnVq1aImzN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2636 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe 2636 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2400 2548 cmd.exe 30 PID 2548 wrote to memory of 2400 2548 cmd.exe 30 PID 2548 wrote to memory of 2400 2548 cmd.exe 30 PID 2400 wrote to memory of 2844 2400 rundll32.exe 31 PID 2400 wrote to memory of 2844 2400 rundll32.exe 31 PID 2400 wrote to memory of 2844 2400 rundll32.exe 31 PID 2844 wrote to memory of 2636 2844 rundll32.exe 33 PID 2844 wrote to memory of 2636 2844 rundll32.exe 33 PID 2844 wrote to memory of 2636 2844 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Nikita.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nikita.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nikita.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Nikita.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
-