Resubmissions
28-11-2024 19:39
241128-yc84dstkfn 1016-11-2024 19:52
241116-ylqcmssfqd 1016-11-2024 17:56
241116-wjcyeszmht 10Analysis
-
max time kernel
63s -
max time network
71s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-11-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.exe.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
New Text Document.exe
Resource
win11-20241007-en
General
-
Target
New Text Document.exe
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nicko.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nicko.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nicko.exe -
Executes dropped EXE 4 IoCs
pid Process 2364 123.exe 2304 bild.exe 4496 SKOblik.exe 1356 nicko.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Wine nicko.exe -
Loads dropped DLL 6 IoCs
pid Process 2304 bild.exe 2304 bild.exe 2304 bild.exe 2304 bild.exe 2304 bild.exe 2304 bild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Public\\Videos\\Video\\bild.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1356 nicko.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x001b00000002aa60-60.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKOblik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nicko.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 nicko.exe 1356 nicko.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2980 New Text Document.exe Token: SeSecurityPrivilege 2304 bild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 bild.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2364 2980 New Text Document.exe 81 PID 2980 wrote to memory of 2364 2980 New Text Document.exe 81 PID 2980 wrote to memory of 2364 2980 New Text Document.exe 81 PID 2364 wrote to memory of 3296 2364 123.exe 82 PID 2364 wrote to memory of 3296 2364 123.exe 82 PID 2364 wrote to memory of 3296 2364 123.exe 82 PID 3296 wrote to memory of 2408 3296 cmd.exe 86 PID 3296 wrote to memory of 2408 3296 cmd.exe 86 PID 3296 wrote to memory of 2408 3296 cmd.exe 86 PID 3296 wrote to memory of 2304 3296 cmd.exe 87 PID 3296 wrote to memory of 2304 3296 cmd.exe 87 PID 3296 wrote to memory of 2304 3296 cmd.exe 87 PID 2980 wrote to memory of 4496 2980 New Text Document.exe 89 PID 2980 wrote to memory of 4496 2980 New Text Document.exe 89 PID 2980 wrote to memory of 4496 2980 New Text Document.exe 89 PID 2980 wrote to memory of 1356 2980 New Text Document.exe 90 PID 2980 wrote to memory of 1356 2980 New Text Document.exe 90 PID 2980 wrote to memory of 1356 2980 New Text Document.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\a\123.exe"C:\Users\Admin\AppData\Local\Temp\a\123.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Public\Videos\Video\netsup.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Public\Videos\Video\bild.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Users\Public\Public\Videos\Video\bild.exeC:\Users\Public\Public\Videos\Video\bild.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\a\SKOblik.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\a\nicko.exe"C:\Users\Admin\AppData\Local\Temp\a\nicko.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5166d71e145b2c802acd2b0a07e070bad
SHA11c84d2e573e7096040fbe6e950fbff764aa11096
SHA25633b22fce68d5d7bd08e86b8506c50bdfcd38c26db5983864e8d33bdf62f53272
SHA5125137efaeda15554cf5b8ff68516d91b9cb3e960b85970f535e8735b1705f62cb390ffef4c7b964ed33764cd3b772aaca0ac1468ec67abe7fd2de9ddf2465f6e4
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
1.8MB
MD5d53d71d4a90c1cf70320d01ce454b13d
SHA162008134743d0d713e92b646bd612356b58375d4
SHA2569fbeae0f902a6f9ab7ba606d20966299a2a0354926bc11ca4a8253bf231ee438
SHA51250ecf93ed96d680c17d9e588c9d488324b8cd4c2a1fdb6389973f66b0c162b3c9d059c868aa19d689e39a58a5113f470799419b89df25cba7807e6c91f81698b
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
257B
MD57067af414215ee4c50bfcd3ea43c84f0
SHA1c331d410672477844a4ca87f43a14e643c863af9
SHA2562050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12
SHA51217b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
103KB
MD58d9709ff7d9c83bd376e01912c734f0a
SHA1e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294
SHA25649a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3
SHA512042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee
-
Filesize
700B
MD55778abd7cf2e8039239cd5982281d61a
SHA19aa6e80a115343a100031c9473fc6a071eefd07e
SHA2560bd4dc8b66c588f715b117021ef14c959e396f5cc6041f885f0d121401bc267a
SHA512dc01567d881d48554732747a286ac9a95ef095b4cb860f384b85636b160778c9efe366f53550b74d9ddf504b293f03bbb252e5247f03490e4567ad142def6e0a
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
311B
MD54db329a7ba03593c3d02c5e80068f82a
SHA170b77611f440dac81778f54a316e811f3b3c63a4
SHA2567182655a9f8489e5b761c16192f3de1662114f7aa9938f87e0062f8859dae7f5
SHA5126b34fc8000a457f44befb03a8153d7e77ca0b8f44705ab7df2fed3f52599a9172e9a866938986a36b4376c99260b5d03b5496dd605dbfbbd7bf301fe72d31f83
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166