Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:10
Behavioral task
behavioral1
Sample
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe
Resource
win7-20240708-en
General
-
Target
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe
-
Size
140KB
-
MD5
e38d8659129aef632adcb71c424ab810
-
SHA1
4d4d540da03d29c12167ad54b33f3fde0d3169ec
-
SHA256
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8
-
SHA512
34cb9281220b7e7a9c9768c0daf19277f8264de697ead7376d80969d200664125fec01515a1feb1736c53229fc1ac30950265d005dba9f94d3cc7994df105b0d
-
SSDEEP
3072:hyRvQ8nQ0d2CRi9LkQ7Bli1BvY5CAFmhDEd5IQ:MjnQ0d9Q7QDEd5D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 116 Nxixea.exe -
resource yara_rule behavioral2/memory/4420-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x0007000000023486-12.dat upx behavioral2/memory/116-14-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Nxixea.exe 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Nxixea.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Nxixea.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File created C:\Windows\Nxixea.exe 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 127296 116 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nxixea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main Nxixea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe 116 Nxixea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 116 4420 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 85 PID 4420 wrote to memory of 116 4420 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 85 PID 4420 wrote to memory of 116 4420 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe"C:\Users\Admin\AppData\Local\Temp\7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Nxixea.exeC:\Windows\Nxixea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 7323⤵
- Program crash
PID:127296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 116 -ip 1161⤵PID:127268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5e38d8659129aef632adcb71c424ab810
SHA14d4d540da03d29c12167ad54b33f3fde0d3169ec
SHA2567a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8
SHA51234cb9281220b7e7a9c9768c0daf19277f8264de697ead7376d80969d200664125fec01515a1feb1736c53229fc1ac30950265d005dba9f94d3cc7994df105b0d
-
Filesize
428B
MD5917eaf4856c4a2d88a8b3e1443d144c0
SHA1c59c8c0055718be0ed138e6e67493f44f5112501
SHA25628a5873e4b8cdac1dd2da713cfa7de4508fa88fb43cdb67ecee1a452e1be5f7c
SHA512fc4db07f40d021f54e9045d7e956f652be768a5a7f2c47560af050c425573219cf3f7a3aa1b6337b4dfdd40d1be738846f8362793508650f9db6a417ac0351d8