Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
Resource
win10v2004-20241007-en
General
-
Target
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
-
Size
2.5MB
-
MD5
e7efb48b374fc3589ec6be9f781716fc
-
SHA1
6e0d6e82e84385eafc1e7f38b444d4a46de63acc
-
SHA256
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc
-
SHA512
8f42efaaf2d56f29779f804cb1df1c8de62ffc86d31d1379d0d658e94702a7300fe9e8df0d5efcbdedf2bbaf2c98fdd0b3ee348f3a4fbea1458c9ac44d155899
-
SSDEEP
49152:IwbmXVc6q/k62mtrJuQPC/74pEF7qhS3alXRI3NbD/QQ2HG6SHL/8+3:Iwcudy5/748alO9bLkmI
Malware Config
Signatures
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 2388 nchsetup.exe 2800 Installer.exe 1332 nchsetup.exe -
Loads dropped DLL 31 IoCs
pid Process 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 2388 nchsetup.exe 2800 Installer.exe 2388 nchsetup.exe 2800 Installer.exe 2800 Installer.exe 2800 Installer.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe 2388 nchsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ExpressAccountsInstall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe" nchsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccounts.exe nchsetup.exe File opened for modification C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccounts.exe nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenu.dll nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenua.msix nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenub.msix nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccountssetup_v11.11.exe nchsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.aac\Shell\NCHeditsound nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mp3\Shell\NCHeditsound\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind WavePad \"%L\"" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.crw nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jp2 nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.pcx\Shell\NCHeditphoto nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.pgf\Shell\NCHeditphoto nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\deprojfile\shell\open\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.srw nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.htm\Shell\NCHconvertdoc\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind Doxillion \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.pgf\Shell\NCHeditphoto\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.psd\Shell\NCHeditphoto\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.voc nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.srf\Shell\NCHslideshow\ = "Créer un diaporama avec PhotoStage" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.docx nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rar\Shell\NCHextract\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind ExpressZip \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.heif nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aac\Shell nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.divx\Shell\NCHeditvideo\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind VideoPad \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gp\Shell\NCHconvertvideo\command nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mpeg2\Shell\NCHconvertvideo\ = "Convertir le fichier vidéo avec Prism" nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.sr2\Shell\NCHslideshow nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.flac\Shell\NCHeditsound\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind WavePad \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.crw nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.nef\Shell\NCHslideshow\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind PhotoStage \"%L\"" nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\apjfile\ = "Recherche gestionnaire extensions non gérées" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mp4\Shell\NCHeditvideo nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gp\Shell\NCHconvertvideo\ = "Convertir le fichier vidéo avec Prism" nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.asf\Shell\NCHconvertvideo nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jfif\Shell\NCHeditphoto\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind PhotoPad \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dv\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.ogv\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ogv\Shell\NCHeditvideo\command nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\deprojfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,19" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dss\Shell nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.vob nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.3g2\Shell\NCHconvertvideo\command nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.nrw nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.gz\Shell nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\7-Zip\.tgz\DefaultIcon nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.aac\Shell\NCHconvertsound\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.mov\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.webm\Shell\NCHeditvideo nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.nef\Shell\NCHconvertimage\command nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.wps nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.tiff\Shell\NCHeditphoto\command nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.tgz\Shell\NCHextract\ = "Extraire avec Express Zip" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.npp nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\vpjfile\shell\open nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.caf\Shell\NCHeditsound\ = "Modifier le fichier audio avec WavePad" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pgffile nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.tga\Shell\NCHconvertimage nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.webp\ = "webpfile" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\arwfile nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.heif\Shell\NCHeditphoto\ = "Retouchez vos photos avec PhotoPad" nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.ape\Shell\NCHconvertsound nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.wav\Shell\NCHconvertsound\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.TS\Shell nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dv\Shell\NCHconvertvideo\command nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.psd\ = "psdfile" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mov\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pgffile\DefaultIcon nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.crw\Shell\NCHslideshow\ = "Créer un diaporama avec PhotoStage" nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dng\Shell\NCHslideshow\ = "Créer un diaporama avec PhotoStage" nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.erf\ = "erffile" nchsetup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 nchsetup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 1952 wrote to memory of 2388 1952 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 30 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2388 wrote to memory of 2800 2388 nchsetup.exe 31 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32 PID 2800 wrote to memory of 1332 2800 Installer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe"C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\ExpressAccounts-2400-1\Installer.exeC:\Users\Admin\AppData\Local\Temp\ExpressAccounts-2400-1\Installer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\n2s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n2s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\ExpressAccounts-2400-1\Installer.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n2s\nchdata.dat"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD556fd278e590cfb770a6fafcbabfa0cf5
SHA121105e95998c1c3dea3d40cc9619097ce3a26547
SHA256cef7a42356f5fe2c1998e8fef00c6a86ffe1f82fbe98bdab70c400e3a7a15a4b
SHA512678a42fde4daa8ad7e750a18150bab006d0bfe7d451fd2916bd9476967e0964168355440f594cca9ecf84ea1eb93a2c4884c9cba3e22ccf7960e3d718e4464ff
-
Filesize
2.5MB
MD538400b9ef545c6e5c7e5d6f45c351b9c
SHA10da3d9bd8b4beba738ea284389ae91579a823726
SHA25686dc6642ebeb2ba69618a82dabf403188d3c48603749bf75500249bfdf88571b
SHA51240feb328fbf028b7a0b7dbca57640324ff15a45a27035a277789fcb0f598804c99d79fb3e9990966a4b1ece73b23e6310fd28e5b19a75c27ee7b31f536b27b6e
-
Filesize
3.7MB
MD5da3244888f5ada3767ac437d1f82beec
SHA1698ba853e522bbf6bc4370d4e619ac3f311e26ba
SHA2562ece7501b636a1876a0c98a1901691d0159ef5db4734a65d8a5498907a572cdf
SHA5129621201b8b6263e9a0d12c10c0c3d08a19f2aa78f0d96906260460ee40ceacf5fd6a196dc46e608301866af5dc48443c5a0f21ff8311db942e51ccc75593d124
-
Filesize
3.6MB
MD5d462aca4e6bc86ae2ebc0c3de913ff47
SHA19815368a0cf0ff9976340c863554ea1b4c6c340a
SHA256b50d7d597ec31063b8b555130b76dd8c35d9e0ecbbfd3cca5864b8da72792d8e
SHA5121eba86ff6ec6467b6eaef3b66ccc8ae06e1473b26c7a2340c360126723dbcccf03e977df0cc214967f7ed0663257119c87dae946089b53c05d6f85d40e7ae17b