Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 16:29
Behavioral task
behavioral1
Sample
Nikita.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nikita.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nikita/Lua.Kb2.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Nikita/Lua.Kb2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nikita/Nikita.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Nikita/Nikita.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
��%�J�w.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
��%�J�w.pyc
Resource
win10v2004-20240802-en
General
-
Target
Nikita/Nikita.exe
-
Size
6.2MB
-
MD5
b41dab020a8427b50c28f19bfe34b612
-
SHA1
5d86a1989ed2064e2d3e0390146dfc85eb84871e
-
SHA256
eb5a4ac30901818ecc052461b2e574a6abc6e6ac1de5f7ce3427868f6cbf6d08
-
SHA512
3b92f9fff191d175cacd2857e327eca1df3338be05c541bbf909fc47f3f9892212fbe3cf4d6808c574dc3bba2d3e176960f9b6e9aeb2c46b12ede1d224547dc2
-
SSDEEP
98304:NPEtdFBgNzb71QGQCPDbZfPmtfXJOLhx9fZAzDJ4wzQgsRuGK4RPBMgS39xTc:N+FOdQmRGFJMIDJf0gsAGK4RPugeTc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3040 Nikita.exe -
resource yara_rule behavioral5/files/0x0005000000019394-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3040 2204 Nikita.exe 30 PID 2204 wrote to memory of 3040 2204 Nikita.exe 30 PID 2204 wrote to memory of 3040 2204 Nikita.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nikita\Nikita.exe"C:\Users\Admin\AppData\Local\Temp\Nikita\Nikita.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Nikita\Nikita.exe"C:\Users\Admin\AppData\Local\Temp\Nikita\Nikita.exe"2⤵
- Loads dropped DLL
PID:3040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee