Analysis

  • max time kernel
    93s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 22:36

General

  • Target

    nig.exe

  • Size

    7.8MB

  • MD5

    173cc74807f4f83be70b6cba40f50062

  • SHA1

    7a875602f2d8ab0dca9e94974d08b1ec33159de2

  • SHA256

    2644014c81793767ee41c67e560ad70e2fe92a99dd3927c641913b9bbda1d58b

  • SHA512

    55133271472697589d53ee8a42cfe425e0fb683c745840982115962659e3f856a531c92ceb4541a399e72459c74c47af4a8b5bdb1103affda5ca2570fa4b0873

  • SSDEEP

    98304:gyAMTWEvfq600kE0iiacNiM5tUHUJFO0/c7vL6:gy7i60MoXmUJP/IL6

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nig.exe
    "C:\Users\Admin\AppData\Local\Temp\nig.exe"
    1⤵
      PID:2836
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1332
      • C:\Users\Admin\AppData\Local\Temp\nig.exe
        "C:\Users\Admin\AppData\Local\Temp\nig.exe"
        1⤵
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\241003-z4mj5sxbjmpowershell.bat
          2⤵
            PID:1032
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\241003-z469jsxblkctf2.bat
            2⤵
              PID:4880
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\241003-v4npzsxfjrWINDOWS.bat
              2⤵
                PID:3596
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\241003-1h3vns1gneNight.bat
                2⤵
                  PID:4164
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\241003-v3vf5s1dlhWINDOWS.bat
                  2⤵
                    PID:624

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\Downloads\241003-1ylw4aselg10ac1113ad3205a1e5545614de9d1b91_JaffaCakes118.exe

                        Filesize

                        66B

                        MD5

                        7e3a3699282ddb091abe87ab419fad8a

                        SHA1

                        57ea0e0e960f692bbf55afb1ac24c081d370c583

                        SHA256

                        b58099123844a93fbe5e05afc5ba94fc8072ec43bc55e17bbe1157609eb6501c

                        SHA512

                        3c6fe1aff34ebe0919bf785edc899f1017e05dca16909061dd37e4b3f841fa66441411910f748b9c7f2ea7c395730a4d85321bcef48143159adb5eb8a3d64303

                      • C:\Users\Admin\Pictures\My Wallpaper.jpg

                        Filesize

                        24KB

                        MD5

                        a51464e41d75b2aa2b00ca31ea2ce7eb

                        SHA1

                        5b94362ac6a23c5aba706e8bfd11a5d8bab6097d

                        SHA256

                        16d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f

                        SHA512

                        b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff