Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
nwEU6IKjU1Kn.exe
Resource
win7-20240708-en
General
-
Target
nwEU6IKjU1Kn.exe
-
Size
14.3MB
-
MD5
f6f37022aa02f7920bb2922b7166e569
-
SHA1
775f671492b4332b745fa931944c6655b07a6e51
-
SHA256
dd6c7714b695eb1a6e16aa5e385920a061fca1534ec84012038274f87410c4b3
-
SHA512
75f1295cc054fde4d455d689746fa8c49b98680b992c0a22a493ed62ef4d1fee0b4fe6ccc0a86a3ac59217d383086a2d2918b0dcaec0c73a88480fc96c683bee
-
SSDEEP
393216:AM+wSvBVMRNEe5khbrHQmNJPCtqwZukp8znc:AM+3BiNEVtHvgqTkpmc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nwEU6IKjU1Kn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nwEU6IKjU1Kn.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nwEU6IKjU1Kn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nwEU6IKjU1Kn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nwEU6IKjU1Kn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nwEU6IKjU1Kn.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ldrupd.bin -
Deletes itself 1 IoCs
pid Process 4164 ldrupd.bin -
Executes dropped EXE 2 IoCs
pid Process 4164 ldrupd.bin 1020 nwEU6IKjU1Kn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nwEU6IKjU1Kn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nwEU6IKjU1Kn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1020 nwEU6IKjU1Kn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 2276 nwEU6IKjU1Kn.exe Token: SeSystemEnvironmentPrivilege 1020 nwEU6IKjU1Kn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1020 nwEU6IKjU1Kn.exe 1020 nwEU6IKjU1Kn.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2276 wrote to memory of 456 2276 nwEU6IKjU1Kn.exe 84 PID 2276 wrote to memory of 456 2276 nwEU6IKjU1Kn.exe 84 PID 2276 wrote to memory of 456 2276 nwEU6IKjU1Kn.exe 84 PID 2276 wrote to memory of 1052 2276 nwEU6IKjU1Kn.exe 85 PID 2276 wrote to memory of 1052 2276 nwEU6IKjU1Kn.exe 85 PID 2276 wrote to memory of 1052 2276 nwEU6IKjU1Kn.exe 85 PID 2276 wrote to memory of 4164 2276 nwEU6IKjU1Kn.exe 90 PID 2276 wrote to memory of 4164 2276 nwEU6IKjU1Kn.exe 90 PID 4164 wrote to memory of 1020 4164 ldrupd.bin 92 PID 4164 wrote to memory of 1020 4164 ldrupd.bin 92 PID 1020 wrote to memory of 4100 1020 nwEU6IKjU1Kn.exe 98 PID 1020 wrote to memory of 4100 1020 nwEU6IKjU1Kn.exe 98 PID 1020 wrote to memory of 4100 1020 nwEU6IKjU1Kn.exe 98 PID 1020 wrote to memory of 1992 1020 nwEU6IKjU1Kn.exe 99 PID 1020 wrote to memory of 1992 1020 nwEU6IKjU1Kn.exe 99 PID 1020 wrote to memory of 1992 1020 nwEU6IKjU1Kn.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:1992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.2MB
MD5892c372206311a3867f66753b5e0674a
SHA15603338f29010166bc4a7bdffa0167f40d72f1fd
SHA256fdd34d4ee9776ada42d9b4ba2363e2062c8bdefa45089f7b2c89fed3be57395d
SHA512e731f47123a676f83e197bf8cc262a0775b3bba739345845d0a249a76ab602e7c22189d5e03ab37564bdf3e6558c63ab1dbd67436024ae0273d0b97f64d2cc94
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db