Overview
overview
7Static
static
3nasm-2.16....64.exe
windows7-x64
7nasm-2.16....64.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3nasm.exe
windows7-x64
1nasm.exe
windows10-2004-x64
1nasmdoc.pdf
windows7-x64
3nasmdoc.pdf
windows10-2004-x64
3ndisasm.exe
windows7-x64
1ndisasm.exe
windows10-2004-x64
1Analysis
-
max time kernel
52s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 14:59
Behavioral task
behavioral1
Sample
nasm-2.16.03-installer-x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nasm-2.16.03-installer-x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
nasm.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
nasm.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
nasmdoc.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
nasmdoc.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ndisasm.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
ndisasm.exe
Resource
win10v2004-20240802-en
General
-
Target
nasm-2.16.03-installer-x64.exe
-
Size
1.0MB
-
MD5
4205b5973d293543e89c2069635117e3
-
SHA1
1a67e9fe7605777a78096007600bfa1492ad0e9c
-
SHA256
657e1252676cfb26a008835c20a760f731c8e0414469a4ed0f83f0fb059cdd35
-
SHA512
50e4b38098f468604b6b6d7873f4100b9305716c4946ce8092f94275e71c8905d36fb8b0c0096410c9ef33f5a93e92dfc68b08e1b59ad8be4b111c1e2546b14d
-
SSDEEP
24576:VUFH8ebk9B82QVMbrNgW9ty9TwmEOIm+vz3GNVmyw2TLBcU48i69/83a:eFc78ZVMbZ3ydxE9jqoywCLBcUT7Ma
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2644 nasm.exe 3020 nasm.exe -
Loads dropped DLL 6 IoCs
pid Process 2532 nasm-2.16.03-installer-x64.exe 2532 nasm-2.16.03-installer-x64.exe 2532 nasm-2.16.03-installer-x64.exe 2532 nasm-2.16.03-installer-x64.exe 2532 nasm-2.16.03-installer-x64.exe 2600 cmd.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\NASM\VSrules\nasm.README nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\LICENSE nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\nasm.ico nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\nasmpath.bat nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\nasmdoc.pdf nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\nasm.exe nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\ndisasm.exe nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\Uninstall.exe nasm-2.16.03-installer-x64.exe File created C:\Program Files\NASM\VSrules\nasm.rules nasm-2.16.03-installer-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nasm-2.16.03-installer-x64.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2600 2868 cmd.exe 34 PID 2868 wrote to memory of 2600 2868 cmd.exe 34 PID 2868 wrote to memory of 2600 2868 cmd.exe 34 PID 2600 wrote to memory of 2644 2600 cmd.exe 35 PID 2600 wrote to memory of 2644 2600 cmd.exe 35 PID 2600 wrote to memory of 2644 2600 cmd.exe 35 PID 2600 wrote to memory of 3020 2600 cmd.exe 36 PID 2600 wrote to memory of 3020 2600 cmd.exe 36 PID 2600 wrote to memory of 3020 2600 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\nasm-2.16.03-installer-x64.exe"C:\Users\Admin\AppData\Local\Temp\nasm-2.16.03-installer-x64.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2532
-
C:\Windows\system32\cmd.execmd /c ""C:\Program Files\NASM\nasmpath.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\NASM\nasm.exenasm3⤵
- Executes dropped EXE
PID:2644
-
-
C:\Program Files\NASM\nasm.exenasm -h3⤵
- Executes dropped EXE
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5d52f0b808ca5c08958c894eb51fbd0ce
SHA14df38ee255f572b3b2336948e774ad8461a50b88
SHA256dab1d811f518bea6ab2b164333b6d80a741a2c291c247926d66f2a30b1d609a8
SHA5124495a898c33e4738285ab0212ad748a60e529916e7cdba61b011e95b01a5677c4c2fff96c8b6e64721c2feec617ad8556990784e068387edcb4a6704861792e9
-
Filesize
118KB
MD55daf94410f68f7ea5beda051c9f23054
SHA1ae734cf1d623a03fe510c434969743e806ba38d2
SHA256e94531c8677f86373377e55f55befca0c9becd084f48571db63a87ac154ed04f
SHA5124bfca2c230fc92abb7db4cd4a6eb7c58a15daa1d5f7ead98096508ef19f626dc7691e59f54ab2a16ae5de364871c2298e40f9e06a10e1998f1aef1b7e55cfa2e
-
Filesize
1.6MB
MD57a564fd688ae791e69c360c1cf54ad61
SHA1c0fa0e8f2416f8c99151dcebceba1bb2f3449409
SHA256a93276636266516421cc9b422f47476c21f7a2949f1ae251556b2f1d33a3be04
SHA512f4b6e93f189787300bbc551465b49468809cc274d45d3452a5932c74cb1d5466b2491358b2c77f2334faa9dc271551bcf3b965b17e1edf3336d5fc78d4605465
-
Filesize
12KB
MD5ac238522827cff2c921d83c76dee76d4
SHA1ebb4f1f27943b9a47cf94957d4b6a58b2ebe789f
SHA25695218c916fd8514cfd7fc234d44a5b0930ca5c1c8dd133e0ad18127ce5ed1d8a
SHA5120f6301b74333aad58a0db469690085fc81a8d9d775d584d2964a33bbdf6b83bafe516f47ebc3908d4f266cde3eb620fcf901f31b9ee7d1197db94baf5885ede8
-
Filesize
7KB
MD514526f5953a85912872802ae286a787a
SHA1ea5815e19b07b4e8f3e197e3f6358138e364f290
SHA256c224f7da273ee3815e462be08fff79b1435eb6e7733e3d4fea5bd95c9f4b1d26
SHA512483ae7b8e462403f0f4bab367586f41a3ee5dea18d81da39b9c64eb1b89c8b9c78be547789fca4f26700a7a6c55bd65464737efe50dde6ef191e691ae8080d66
-
Filesize
14KB
MD58e7a455526283d46300d394522e59f2b
SHA1182a511fec4806cc886ce3c8170648411ba841b8
SHA2562a637a57dfe1d492af5003c03feddf4de34c3e10537a849987efd3465aea59b1
SHA5123f57012aee8118d9d75b988b14a92191593c59a1c51a76569ff94232b25a5c3dc710f5fe4ccfb717ab32d48d51f0755543dc77e4cbabed68061ad18496126e38