Resubmissions

16-11-2024 14:20

241116-rnk3daxkez 10

16-11-2024 14:18

241116-rmjg6axkds 10

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2024 14:18

General

  • Target

    NovaFix.exe

  • Size

    15.8MB

  • MD5

    17660ffd18fea1aef4b0211aa64eadaf

  • SHA1

    c490b67db3ca9b660bdd75e9289a6320c8468356

  • SHA256

    848db7fd2e97fc55b86ea5b52db37680f1f7f80e0940483002d7e903266180d7

  • SHA512

    bda84e8618df836bc287cd676eb8894ea76ada0df120f7f3697bf8eb6089d74e19c3141b57d32811c8edbee610b9347e40c0c1e78072bbfe2d70b71e5652857f

  • SSDEEP

    393216:uiIE7Yo9+4uOwKntpUTLfhJsW+eGQRe9jo7BGcG/3JrO0WCWLu:v7r9+RONHUTLJSW+e5Re9M0VWLu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NovaFix.exe
    "C:\Users\Admin\AppData\Local\Temp\NovaFix.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\NovaFix.exe
      "C:\Users\Admin\AppData\Local\Temp\NovaFix.exe"
      2⤵
      • Loads dropped DLL
      PID:2812
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI17682\python312.dll

    Filesize

    6.6MB

    MD5

    5c5602cda7ab8418420f223366fff5db

    SHA1

    52f81ee0aef9b6906f7751fd2bbd4953e3f3b798

    SHA256

    e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce

    SHA512

    51c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f

  • memory/1736-167-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/1736-168-0x000000013F300000-0x000000013F3F8000-memory.dmp

    Filesize

    992KB

  • memory/1736-169-0x000007FEF7190000-0x000007FEF71C4000-memory.dmp

    Filesize

    208KB

  • memory/1736-172-0x000007FEFAEA0000-0x000007FEFAEB7000-memory.dmp

    Filesize

    92KB

  • memory/1736-171-0x000007FEFBAF0000-0x000007FEFBB08000-memory.dmp

    Filesize

    96KB

  • memory/1736-170-0x000007FEF6560000-0x000007FEF6816000-memory.dmp

    Filesize

    2.7MB

  • memory/1736-176-0x000007FEF6CD0000-0x000007FEF6CE1000-memory.dmp

    Filesize

    68KB

  • memory/1736-175-0x000007FEF7150000-0x000007FEF716D000-memory.dmp

    Filesize

    116KB

  • memory/1736-174-0x000007FEF7170000-0x000007FEF7187000-memory.dmp

    Filesize

    92KB

  • memory/1736-173-0x000007FEF7B70000-0x000007FEF7B81000-memory.dmp

    Filesize

    68KB

  • memory/1736-178-0x000007FEF6AB0000-0x000007FEF6B17000-memory.dmp

    Filesize

    412KB

  • memory/1736-177-0x000007FEF5380000-0x000007FEF6430000-memory.dmp

    Filesize

    16.7MB

  • memory/1736-188-0x000007FEF5380000-0x000007FEF6430000-memory.dmp

    Filesize

    16.7MB

  • memory/1736-199-0x000007FEF5380000-0x000007FEF6430000-memory.dmp

    Filesize

    16.7MB