Analysis
-
max time kernel
117s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
b8599c3f3b018f8a5cab193fba0af150N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8599c3f3b018f8a5cab193fba0af150N.exe
Resource
win10v2004-20240802-en
General
-
Target
b8599c3f3b018f8a5cab193fba0af150N.exe
-
Size
995KB
-
MD5
b8599c3f3b018f8a5cab193fba0af150
-
SHA1
4ad1d799ffda3a787854e3eeb416b06b1034f1db
-
SHA256
3a577c1f05a76a432c3811eb5c65ca71b3e08106f6d52d5b1357ebc2e78b0da6
-
SHA512
19707fb9a7ad1c5511925afdd6a3f025345d56f2bb36828d189fbd7b72ed6080efe81909ec7801772f8db8de8d04950664a4b63f97c5427e8843384012bab310
-
SSDEEP
24576:4DD/3cVwxu0I/nCkHdXMsHAVI5GJIZCupCfpSI5CVJQGC2DKIxMP:i3cK9AHgVI5GJIZCupCfpSI5CVJ/DKn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 ngigys.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\ngigys.exe" ngigys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8599c3f3b018f8a5cab193fba0af150N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngigys.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2504 4064 b8599c3f3b018f8a5cab193fba0af150N.exe 86 PID 4064 wrote to memory of 2504 4064 b8599c3f3b018f8a5cab193fba0af150N.exe 86 PID 4064 wrote to memory of 2504 4064 b8599c3f3b018f8a5cab193fba0af150N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8599c3f3b018f8a5cab193fba0af150N.exe"C:\Users\Admin\AppData\Local\Temp\b8599c3f3b018f8a5cab193fba0af150N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\ProgramData\ngigys.exe"C:\ProgramData\ngigys.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD51082598bc474f87b30a86552362e8bf2
SHA17dd50d0a3d0a30383190d6c0221cafdb656f0b9e
SHA256609750d1f6ae897d91c3da37074cb75cffab1411b447ba11ff1e5992ce557694
SHA5124303d611629c8fe71bcadc5e6490a2f91966c7b25be017e59773692e4c32d8314d8ac6000c882d798bc533db08e58b8adc29a8be6027bcc92816917c8f52e779
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
858KB
MD55ff7afdcdc4db46d0918906c25c4b5be
SHA144b02c4a8ed4ceae66cc09ea7e294f34f4e71811
SHA256211b4ca9bca1655b27954c4796ecd29e8943b40a04a24276b38e7074e718fcb7
SHA51206df2504fef46421e5ea671b8373ff733b2c3f81de9fd2721223155562cbf7b2e396981b72da8dfa94010dbfdd458fc4aaba9d229c7b92ce605e250bbad2fe2c