Analysis

  • max time kernel
    357s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 15:43

General

  • Target

    Nyx.exe

  • Size

    7.5MB

  • MD5

    34e9e2070c4b959fd5cde9aff77cd68b

  • SHA1

    6aba2fb635ca0d6444684f015c97d1b5bce5d957

  • SHA256

    1fdca0ed906e4cd623eef962377f59bcdce2dde3233a0a1ca306d8b5a9e9268c

  • SHA512

    e38558b1a23872efcef6d252918f12e1732cd4b151bbc4d51b8a56bb9934f63b3d4ac9838f8c28edfb1549a89f18b128be502dfed2a537a2d1bf2695fa1ceb70

  • SSDEEP

    98304:J35dIISLSHkNnEXSzrfZM7WcciwU6nqnlve59oI+k6k5MukqjpMxNepV:J35uaCEYrBM7Wc4hnqlGX6k5FTMW

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nyx.exe
    "C:\Users\Admin\AppData\Local\Temp\Nyx.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://dotnet.microsoft.com/en-us/download/dotnet-framework/thank-you/net48-web-installer
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edf5d2b8c0a6b33b076c64844a119a8b

    SHA1

    029b24231b2ec3a6ef2b7567f12384e27ae503cd

    SHA256

    5916747c0febe2d7d533beb930db7b311227e1cc69bb1116fa2a1c3ec1d55495

    SHA512

    de24a802952aac1f13004df30f3c5926bd3a58e694b63a2a7deee939b1d13a8c889f1cae244f184e92f3c84821c8ea53de6c3061123fc947c53fa8a16e11488f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb53e35043b716db44018d6d76631bab

    SHA1

    858f1b153193fb3ae476eaaee975a1003a74f9a1

    SHA256

    608fed643d56608c95fab8bfca1dc053659b42301c7581cb84b4035d6569885a

    SHA512

    b860942c04231756d72252f5fe8280152aef50f09611f7279887e817f71e2008c0259ab4dcdd63f0b225a3c0a006d8c8c1d4717b58d4956f6396d5d2f6dd891e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ead809320de15084a94c10f1f937322f

    SHA1

    c60f9e64f87298480d77d5c4354e019deeb012d6

    SHA256

    498c732be9ba8c3c5511ced48b3c20b24b4791c909907f115dc3b46cd28f58f3

    SHA512

    22b523da9e234bbc6c57a5b512853ffabef097ddbc60e26fb1bd136ac4d5b70ae1c166b1995d4fb7baa2f43aafa11c5044cb1ef52006eb3011c3163f9b99832f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfe3407005cc22f985f6cfcf7a11ac99

    SHA1

    0cfce1d5b10ca4f3dd750cf8a824d0dd89e68a83

    SHA256

    c7b3b7c4edc4d0197e9f3c76454fb19084ee2c08a0574d218b34d1339f5f6d11

    SHA512

    eef964d1869208f86752561e7dd372151ec7442a1ce1d786c96460e7143c25e7c066a5b9bdddfa9f025853470644b74b40f6ceb5819977362aa8ef920e0cc837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65569f5a9c8d13c3ba16d8870108c56

    SHA1

    f94004cc755bd6877cfbcc648693414b12b674ed

    SHA256

    f91a7d7b128ae724eacfe13fcc2bdf37fd2c2b0f4b97c77e34edf5d44f208a92

    SHA512

    4994f89fcd519e3777b34ba555d9b0d319d17ac716b116518cfa18b537a09c44ac29a5c5767efb5dffc293646389c84f6402a306ae9291ee97e34f0c9fdec9d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1966f72384547098f3107bb96fd99197

    SHA1

    e30df3b840afab2fc3b511540b3103a9d896c977

    SHA256

    873d2198f4222f413596ea86d921724729b6ef122f9b94b9dd9e0678fb0d4317

    SHA512

    0586b70ab6c69a7d8a30d3cf2725d2f8b6d853d931b219315b7efc251d7be210c6322c77406869777d3c19414a1e2b53663be13627786a479b9cdc1a916a38e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f852c95be42b21d97e0c35e430aed0be

    SHA1

    a8c8abd042ba41d194728a23652dbd8270df09bf

    SHA256

    88ce66d6e3c2dc0d79f081c4b89d230092984744ec20f6946555f534166a5932

    SHA512

    0f385487ee134ff4162e3cc77d98607fc1fdcfdb2ca7439520433aa2d55597d03a3a6bc008ea24d3cf5e21020b2df7d9de33bf4774d5c0232d9bd65ca5496464

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c576445dc1512c33477a4775e337268c

    SHA1

    f46b407dee5964df1371b3faab994ce4485ae101

    SHA256

    b9db52a5a0ce41211b500fa450237f161c43590febf81062e9155ff530f3aceb

    SHA512

    e283491bd48f47b80deb2cc4c8b6570243b85205bb5173d29ee2f87f028ccc5659b458aaac4d270b8b5ba57690872ac202bcb82d7e3f4d738b2ccf17fc7e5557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5874a88e261f355d84ff1ceabf61fae1

    SHA1

    d1b65266064593966e716f7125181a3bf36d15ea

    SHA256

    9fe4bc200872996209ed53dd1f425be203358d50c65a1da8a5bef5ea98fe7fbc

    SHA512

    14fdfa00e663c32f9d6e1208acfac76f3b18c484df65614805d2db71ddcdbf0a937436067bdd8f113687f1fb811cf232612878089f6d5038235244fbc0d10c40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5790f87dce792177dec87981b24b9d0a

    SHA1

    1bc84c9a59800ed31456322cb8dfe0da1ce2df93

    SHA256

    adac0070b0b997e046317a8eb24ee2ebeacd9c411293f798283c34c7b6a53f4e

    SHA512

    f7e839494411670d4d2347fe849208c654d6e315875abf757e1f0e5d95a2719a1f1c7c3fcebcf04bf4a221b8135336a39ae47080a574b35688bcf9f03c57eba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dd19747d75cfe39e7e880135d7da1c3

    SHA1

    1555919a7f17d17754f8b8d6ccaf1d4caa3e8798

    SHA256

    c7d4f7cacfa0c1b0deb55c4227653cc2d408306bf16de679f6a5c12e767a496e

    SHA512

    8c431d92b853ee092762b624e08963f4c9f4c56cea5cdb70b98dc52411e2bee21bbe5c22c042ca34950ffaed7d19c79274c9e4858bf2b0641ccbcb318c2634db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98f2c2d5251217191299fcf8957fef12

    SHA1

    7d2db285a0a39ca181307195b8df35fe3600d952

    SHA256

    19e4629f7fe93325f014fe8706e28e71b0a6185841c3976ec860d0603cd4fb75

    SHA512

    aca14a978062656ab9e1534b3b4ae055dd2b0f8da60a42d7d0735ce722eb92d1f835cb861bbd16fe1cd07bad561d4f18e0bb389f612941044665ca930e26ea46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106504b6cd1d6fbff4c33a5acf6fd300

    SHA1

    1c28fc0e779a7ef74f597772b8dc4dbceda45bfb

    SHA256

    38b7ddbfb95bfea9c666da3160f487ef9ba97bcf2c88cbe990733b1f2ea4d220

    SHA512

    651ae1a4e59a4aa32af392dfaf5c7e3493b211e7bc4a202a62ae8b59fb1dd9b53872ec22362305a901206ed026fe797661e7dfcf92b69f98c576fca7d0e61e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2202e6d16b58c280d5385813cdfb2fc

    SHA1

    1f1586d057f56ada5d23242cd2f144ea429828b9

    SHA256

    918520e89c974325be264fae19019d5cd34fe3bc090c09d1338a6f1cfc4393f8

    SHA512

    9391a5fbbab5b37e467f64e3e688702f33a6f23176853ba4c9be8548836ae0506b185aa54df1f01f38da3de666cd0e0df09be7f031b973ecfcfb3be55726f1ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    637e233cd7542c06caf1c59e9ecf753e

    SHA1

    b6cefcd435962c3954086f57dccb1dc0be48d1cf

    SHA256

    fd3fd373a3154a044b605772e849db6781ef44cd871254188d883b83cedcba73

    SHA512

    890f70421c8f951406783f5e64078ab0d8658daa67c52fa615ac10715e8017fe9fac3af0fd360f825e56c00dc1a39ee4ddec10abb86b91cb3a6e7fe6b5d3e576

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31535b23e7d01895e465248a0ec2faea

    SHA1

    d4e7fe152347e89841b0e6ba97440d5703b2df7f

    SHA256

    f9308a57296c54cb2592b952f4a73716599677512bdb8fc1dfa81bf870e3199d

    SHA512

    3b001964a2bc94b9f3ddd8f09544645be7d5736d94840f55dab4e883d960ba60f8ce9eae098e701d379e3fedd2e7ae20dc40cb3be9bf2bbdced9ba1ef1c6a80a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    457c40b6b774ce91ff9fb0f5102cd84e

    SHA1

    43e6d5136193903bca9cd9f4b188b27b8341451c

    SHA256

    2fe00af4be43149c58c89dfe4218cbb9f02372309dfeaeee9e5baf7b98a87b87

    SHA512

    30bd00f235372dd0c6f5259aa4ad731f70c5a9893a84d9284530df1542d36f23c363dd0c1916b2e66e895d2447e7c445c320296f26d2f94285ea7534ca8e41cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fa3b74623d13208619242e916387156

    SHA1

    c3d9563d2fab7e44b9b917eace3565944006db9c

    SHA256

    be2c75888dd05c9a55bd4d9512405b3c308e2ca417a7a46c084bc9ffbecff2c9

    SHA512

    2fb1a8e25894efaa0fa48d1c97da7543d3a941e0c0a9bd5d015724af05de30ba55c7b58b6428a3f3a247d754c03a37ce26ad8a199b3afec9eec08e3be72baf00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a21d2eb12b42b2b4623a56579f5957c

    SHA1

    9bdedd99a86ca50bb8e0fc8f10f01ce2cafb8f22

    SHA256

    894d33f7288888f1eadcc9007a4a40760e6362c128dbaf9564d94954364e54f5

    SHA512

    74942cab100640e667fc577aeffd068c2ba1f948160d2ac587b87799d10bc06692861dde78c273807c9404055669b939bfa8d6bd57adf32897a55a561dca2b8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ff3e22a30caa10bbef80c2917b87c20

    SHA1

    06965c71ad3ef6bf3effa215bce093016fa1dc71

    SHA256

    7d7898842a4874fe8b958705e0640931dcdca0dcc0496cf08efb941cbb18c17b

    SHA512

    2a275e7bb1d2d212eebd51a35875b1f62ccc858f4f083c58823bb6c0c981d475bce9296fc4b1955fb239545816680a234fec246bcf063d9de6d7ee3852d095a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d2457a2d1954be083c44e6ea055578d

    SHA1

    f469f6baf7586e0974e74a3270b84b345c4dc071

    SHA256

    f0ea268ab73f65331d065f9bb8b7975c1bbf3f82b53dfb7af47a218ea49908d8

    SHA512

    2fa15d561ba1c381ed2e95903dae80d250a8158a987348cfcf53b0a8e70f5aa576ee699d4d2404af972b5804c3fb88b9999c387a53af2c785b1b1bf43789ad24

  • C:\Users\Admin\AppData\Local\Temp\Cab1334.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar13D4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2404-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

    Filesize

    4KB

  • memory/2404-7-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-6-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-3-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/2404-5-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-4-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/2404-2-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-1-0x0000000000A80000-0x00000000011FE000-memory.dmp

    Filesize

    7.5MB