Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
nigger.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
nigger.exe
Resource
win10v2004-20240802-en
General
-
Target
nigger.exe
-
Size
10.1MB
-
MD5
6bba4d801c34ffb654b9a6b00f5dd2fb
-
SHA1
085287cc542def54fe518c012085cb0dda517e57
-
SHA256
444e524a7f5829a9ff3fd898dbf5f380bf7fb56e0ce02dceec4252eee2f01f01
-
SHA512
665df9008d34f8ca291fce7eee940e9dcdf84ba4aff34b80b3af6dcd8132796bf1018a22aba1413a176de8bf43856871842f6714b449bd2b857e2fc0aa839368
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVhpalk:UVqoCl/YgjxEufVU0TbTyDDalQlk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 3392 icsys.icn.exe 4172 explorer.exe 4320 spoolsv.exe 1076 svchost.exe 2900 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe nigger.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 4808 nigger.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 3392 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4172 explorer.exe 1076 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4808 nigger.exe 4808 nigger.exe 3392 icsys.icn.exe 3392 icsys.icn.exe 4172 explorer.exe 4172 explorer.exe 4320 spoolsv.exe 4320 spoolsv.exe 1076 svchost.exe 1076 svchost.exe 2900 spoolsv.exe 2900 spoolsv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3392 4808 nigger.exe 83 PID 4808 wrote to memory of 3392 4808 nigger.exe 83 PID 4808 wrote to memory of 3392 4808 nigger.exe 83 PID 3392 wrote to memory of 4172 3392 icsys.icn.exe 84 PID 3392 wrote to memory of 4172 3392 icsys.icn.exe 84 PID 3392 wrote to memory of 4172 3392 icsys.icn.exe 84 PID 4172 wrote to memory of 4320 4172 explorer.exe 85 PID 4172 wrote to memory of 4320 4172 explorer.exe 85 PID 4172 wrote to memory of 4320 4172 explorer.exe 85 PID 4320 wrote to memory of 1076 4320 spoolsv.exe 86 PID 4320 wrote to memory of 1076 4320 spoolsv.exe 86 PID 4320 wrote to memory of 1076 4320 spoolsv.exe 86 PID 1076 wrote to memory of 2900 1076 svchost.exe 87 PID 1076 wrote to memory of 2900 1076 svchost.exe 87 PID 1076 wrote to memory of 2900 1076 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\nigger.exe"C:\Users\Admin\AppData\Local\Temp\nigger.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5ad73f224afc55feb3c8ce26655782306
SHA1e132c45cf97f4f772b1e14c7bbd99536aa2ca92e
SHA256da07e5c1fc7b6e204b9074a1c5893de2ac17f1a7c2de492228633aa300df12e1
SHA512d5cd7a17e56767bff3c4fe0faf83ee2b445f0bc77f7bfb37dbb37a4c0cf2011e7072f0da4b4fee67b8baee8fa8b189863977544d9701fb54b79dbd5e1f2c02de
-
Filesize
135KB
MD55ecbb7ee5078d91b6dad8aae43e59d01
SHA1dc78d6df44d9c05b7f771f9d23538b1c6fe697b9
SHA256e5c189b687e2de461826321ef745a4577832f83aea63bf2667829b0c4c4632af
SHA51272e3eea0a2df49d06ed656b170fdb4a12b7371841539ad7e001b276013e93e5e623b07f8c87ca80d72c6112a9792d5efaa9aee6f8053441ddaedd9b92194ab43
-
Filesize
135KB
MD5cc33e55e07a6f44cafac5e89fc9ce697
SHA1113b3e3936e2f1f180fd262be72d75d72d531509
SHA256044698056a92de96de7a69825a6f6a05abe4ec4f58588acfb42bbad4372d2295
SHA5128fc274bd49f8f807303ef471b437f4e95de4141f5f34e25d61a4bbbd7fd7f74c9e048116b8d38c093a3053a620d3ad90331842f89a6b76f33efd013ff685a0d2
-
Filesize
135KB
MD55e8ba3708a1eb5b0882916024fb4d9f2
SHA113d35d956225be8ff7f2550f9f8ae38886633970
SHA256b341b3b74077ee5cd4d95d405047222a9ddbbbfc5717edb26e296af2ec042104
SHA51250f19acc4fe19bf6e35fdb9a8d8ed9052063486c712507b37c2f76e5b157715eb2c70c160598a059aef39c86309a6ef34692514e7894095640e8ef0957c150ec