Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 14:39

General

  • Target

    nigger.exe

  • Size

    10.1MB

  • MD5

    6bba4d801c34ffb654b9a6b00f5dd2fb

  • SHA1

    085287cc542def54fe518c012085cb0dda517e57

  • SHA256

    444e524a7f5829a9ff3fd898dbf5f380bf7fb56e0ce02dceec4252eee2f01f01

  • SHA512

    665df9008d34f8ca291fce7eee940e9dcdf84ba4aff34b80b3af6dcd8132796bf1018a22aba1413a176de8bf43856871842f6714b449bd2b857e2fc0aa839368

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVhpalk:UVqoCl/YgjxEufVU0TbTyDDalQlk

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nigger.exe
    "C:\Users\Admin\AppData\Local\Temp\nigger.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3392
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4172
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4320
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1076
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    ad73f224afc55feb3c8ce26655782306

    SHA1

    e132c45cf97f4f772b1e14c7bbd99536aa2ca92e

    SHA256

    da07e5c1fc7b6e204b9074a1c5893de2ac17f1a7c2de492228633aa300df12e1

    SHA512

    d5cd7a17e56767bff3c4fe0faf83ee2b445f0bc77f7bfb37dbb37a4c0cf2011e7072f0da4b4fee67b8baee8fa8b189863977544d9701fb54b79dbd5e1f2c02de

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    5ecbb7ee5078d91b6dad8aae43e59d01

    SHA1

    dc78d6df44d9c05b7f771f9d23538b1c6fe697b9

    SHA256

    e5c189b687e2de461826321ef745a4577832f83aea63bf2667829b0c4c4632af

    SHA512

    72e3eea0a2df49d06ed656b170fdb4a12b7371841539ad7e001b276013e93e5e623b07f8c87ca80d72c6112a9792d5efaa9aee6f8053441ddaedd9b92194ab43

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    cc33e55e07a6f44cafac5e89fc9ce697

    SHA1

    113b3e3936e2f1f180fd262be72d75d72d531509

    SHA256

    044698056a92de96de7a69825a6f6a05abe4ec4f58588acfb42bbad4372d2295

    SHA512

    8fc274bd49f8f807303ef471b437f4e95de4141f5f34e25d61a4bbbd7fd7f74c9e048116b8d38c093a3053a620d3ad90331842f89a6b76f33efd013ff685a0d2

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    5e8ba3708a1eb5b0882916024fb4d9f2

    SHA1

    13d35d956225be8ff7f2550f9f8ae38886633970

    SHA256

    b341b3b74077ee5cd4d95d405047222a9ddbbbfc5717edb26e296af2ec042104

    SHA512

    50f19acc4fe19bf6e35fdb9a8d8ed9052063486c712507b37c2f76e5b157715eb2c70c160598a059aef39c86309a6ef34692514e7894095640e8ef0957c150ec

  • memory/1076-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2900-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3392-10-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3392-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4172-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4320-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4808-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4808-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB