Analysis
-
max time kernel
27s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/09/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
nigger.exe
Resource
win11-20240802-en
General
-
Target
nigger.exe
-
Size
10.1MB
-
MD5
6bba4d801c34ffb654b9a6b00f5dd2fb
-
SHA1
085287cc542def54fe518c012085cb0dda517e57
-
SHA256
444e524a7f5829a9ff3fd898dbf5f380bf7fb56e0ce02dceec4252eee2f01f01
-
SHA512
665df9008d34f8ca291fce7eee940e9dcdf84ba4aff34b80b3af6dcd8132796bf1018a22aba1413a176de8bf43856871842f6714b449bd2b857e2fc0aa839368
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVhpalk:UVqoCl/YgjxEufVU0TbTyDDalQlk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 1568 icsys.icn.exe 956 explorer.exe 1340 spoolsv.exe 4272 svchost.exe 3624 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe nigger.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigger.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1752 nigger.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 1568 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 956 explorer.exe 4272 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1752 nigger.exe 1752 nigger.exe 1568 icsys.icn.exe 1568 icsys.icn.exe 956 explorer.exe 956 explorer.exe 1340 spoolsv.exe 1340 spoolsv.exe 4272 svchost.exe 4272 svchost.exe 3624 spoolsv.exe 3624 spoolsv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1568 1752 nigger.exe 78 PID 1752 wrote to memory of 1568 1752 nigger.exe 78 PID 1752 wrote to memory of 1568 1752 nigger.exe 78 PID 1568 wrote to memory of 956 1568 icsys.icn.exe 79 PID 1568 wrote to memory of 956 1568 icsys.icn.exe 79 PID 1568 wrote to memory of 956 1568 icsys.icn.exe 79 PID 956 wrote to memory of 1340 956 explorer.exe 80 PID 956 wrote to memory of 1340 956 explorer.exe 80 PID 956 wrote to memory of 1340 956 explorer.exe 80 PID 1340 wrote to memory of 4272 1340 spoolsv.exe 81 PID 1340 wrote to memory of 4272 1340 spoolsv.exe 81 PID 1340 wrote to memory of 4272 1340 spoolsv.exe 81 PID 4272 wrote to memory of 3624 4272 svchost.exe 82 PID 4272 wrote to memory of 3624 4272 svchost.exe 82 PID 4272 wrote to memory of 3624 4272 svchost.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\nigger.exe"C:\Users\Admin\AppData\Local\Temp\nigger.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD59465cad301dcb5b99db8bf97b87719c9
SHA1a705da408f546ac4495ecd4013dfd525c09f2c88
SHA2569c5fa509cf87259a8f204a938644d84f0d1ff584ffe19ce7961fe4224b9cfd88
SHA51267b13d63bdee9942422fbe94fc83be6860c59e801f13c89d839e2a262da6f1434590b0ce50aa864189e87dca175f57ffca26e0835f9179515e44fccb9d89edd2
-
Filesize
135KB
MD55ecbb7ee5078d91b6dad8aae43e59d01
SHA1dc78d6df44d9c05b7f771f9d23538b1c6fe697b9
SHA256e5c189b687e2de461826321ef745a4577832f83aea63bf2667829b0c4c4632af
SHA51272e3eea0a2df49d06ed656b170fdb4a12b7371841539ad7e001b276013e93e5e623b07f8c87ca80d72c6112a9792d5efaa9aee6f8053441ddaedd9b92194ab43
-
Filesize
135KB
MD5585a65f88f6f57f9258f11681033433b
SHA1e66c5c45c8f5d4812ca9fa676be7a626c414ed87
SHA2567f96056aa757ef6cc9abb512e63195f9eee3c30738e0d79b19bf054245fcb9fa
SHA512beb1b8f40fed3c4e104185889e0139e730e379c39ff3daf7800cd3b4f64f8d6760c2579240282f6abff42ecdf68d29682a2a660e16a18d45182134e2f7f9bac0
-
Filesize
135KB
MD542b8281f6a221df985fb02614f05ad6f
SHA1f2ceb7cbfa17ff27d62e5be5caf3deb21806ade6
SHA256e72b462fceb6e7f8039c9de9462524184e97c82a3804d6de11c4c37adefc9b56
SHA5125c715c7e96b50dc8a8561d774dda9106c7e9ff2faa065474ca09b3d9e51d08e13e2c65ddeb81b98e2c639ebcd74c9b52367af7505c75dadda8bbd0a0b5ec7059