Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
Resource
win10v2004-20241007-en
General
-
Target
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe
-
Size
2.5MB
-
MD5
e7efb48b374fc3589ec6be9f781716fc
-
SHA1
6e0d6e82e84385eafc1e7f38b444d4a46de63acc
-
SHA256
55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc
-
SHA512
8f42efaaf2d56f29779f804cb1df1c8de62ffc86d31d1379d0d658e94702a7300fe9e8df0d5efcbdedf2bbaf2c98fdd0b3ee348f3a4fbea1458c9ac44d155899
-
SSDEEP
49152:IwbmXVc6q/k62mtrJuQPC/74pEF7qhS3alXRI3NbD/QQ2HG6SHL/8+3:Iwcudy5/748alO9bLkmI
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Installer.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 3688 nchsetup.exe 1140 Installer.exe 868 nchsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ExpressAccountsInstall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe" nchsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenua.msix nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenub.msix nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccountssetup_v11.11.exe nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccounts.exe nchsetup.exe File opened for modification C:\Program Files (x86)\NCH Software\ExpressAccounts\expressaccounts.exe nchsetup.exe File created C:\Program Files (x86)\NCH Software\ExpressAccounts\shellmenu.dll nchsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nchsetup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aif\Shell nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wp\Shell\NCHconvertdoc\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind Doxillion \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.ogg\Shell\NCHeditsound\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.asf\Shell\NCHconvertvideo nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.gz\Shell\NCHextract\ = "Extraire avec Express Zip" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.tar.gz nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\7-Zip\.tgz\DefaultIcon nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.pcx nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aif\Shell\NCHeditsound nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gp\Shell\NCHconvertvideo nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.webp\Shell nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.dng\Shell\NCHslideshow\command nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\wpfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,19" nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.caf\Shell\NCHeditsound\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind WavePad \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.wma\Shell\NCHconvertsound nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.mpeg\Shell\NCHconvertvideo\command nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\webpfile\DefaultIcon nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.cab\Shell\NCHextract nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\ddpfile\shell\open\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind DreamPlan \"%L\"" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mov\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.bmp nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.doc\Shell\NCHconvertdoc nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.iso\Shell\NCHextract nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rar\Shell\NCHextract\ = "Extraire avec Express Zip" nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.spj\ = "spjfile" nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\spjfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,19" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aiff\Shell\NCHeditsound nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.gsm\Shell\NCHconvertsound nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.flac\Shell\NCHeditsound\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.ds2\Shell\NCHconvertsound nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.divx nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.bmp\Shell\NCHconvertimage\command nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.pdf\Shell\NCHconvertdoc\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind Doxillion \"%L\"" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\wpfile\DefaultIcon nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.wps\Shell\NCHconvertdoc nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.caf\Shell\NCHconvertsound\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ogv\Shell\NCHeditvideo\command nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aiff\Shell\NCHeditsound\command\ = "\"C:\\Program Files (x86)\\NCH Software\\ExpressAccounts\\expressaccounts.exe\" -extfind WavePad \"%L\"" nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.caf\Shell\NCHconvertsound\ = "Convertir le fichier audio avec Switch" nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gp\Shell\NCHconvertvideo\ = "Convertir le fichier vidéo avec Prism" nchsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.dct\ = "dctfile" nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\vpjfile\shell\open nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aiff\Shell nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m4v\Shell nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exr\Shell nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.heif\Shell\NCHeditphoto nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.webp\Shell\NCHeditphoto\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.voc nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\voxfile nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.avi\Shell nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.doc\Shell\NCHconvertdoc\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.aif\Shell\NCHconvertsound nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.vob nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.asf\Shell\NCHconvertvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\Software\Classes\SystemFileAssociations\.tga\Shell\NCHconvertimage nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rar\Shell\NCHextract\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mp3\Shell\NCHeditsound\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dv\Shell\NCHeditvideo nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mpeg\Shell\NCHeditvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ogv\Shell\NCHconvertvideo\command nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.asf\Shell\NCHeditvideo\command nchsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jp2\Shell\NCHslideshow\ = "Créer un diaporama avec PhotoStage" nchsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.pdf\Shell\NCHconvertdoc\command nchsetup.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\spjfile\shell\open nchsetup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3688 nchsetup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3688 1940 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 83 PID 1940 wrote to memory of 3688 1940 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 83 PID 1940 wrote to memory of 3688 1940 55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe 83 PID 3688 wrote to memory of 1140 3688 nchsetup.exe 102 PID 3688 wrote to memory of 1140 3688 nchsetup.exe 102 PID 3688 wrote to memory of 1140 3688 nchsetup.exe 102 PID 1140 wrote to memory of 868 1140 Installer.exe 103 PID 1140 wrote to memory of 868 1140 Installer.exe 103 PID 1140 wrote to memory of 868 1140 Installer.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe"C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\ExpressAccounts-3532-1\Installer.exeC:\Users\Admin\AppData\Local\Temp\ExpressAccounts-3532-1\Installer.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\n2s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n2s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\ExpressAccounts-3532-1\Installer.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n2s\nchdata.dat"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD538400b9ef545c6e5c7e5d6f45c351b9c
SHA10da3d9bd8b4beba738ea284389ae91579a823726
SHA25686dc6642ebeb2ba69618a82dabf403188d3c48603749bf75500249bfdf88571b
SHA51240feb328fbf028b7a0b7dbca57640324ff15a45a27035a277789fcb0f598804c99d79fb3e9990966a4b1ece73b23e6310fd28e5b19a75c27ee7b31f536b27b6e
-
Filesize
1.6MB
MD556fd278e590cfb770a6fafcbabfa0cf5
SHA121105e95998c1c3dea3d40cc9619097ce3a26547
SHA256cef7a42356f5fe2c1998e8fef00c6a86ffe1f82fbe98bdab70c400e3a7a15a4b
SHA512678a42fde4daa8ad7e750a18150bab006d0bfe7d451fd2916bd9476967e0964168355440f594cca9ecf84ea1eb93a2c4884c9cba3e22ccf7960e3d718e4464ff
-
Filesize
3.7MB
MD5da3244888f5ada3767ac437d1f82beec
SHA1698ba853e522bbf6bc4370d4e619ac3f311e26ba
SHA2562ece7501b636a1876a0c98a1901691d0159ef5db4734a65d8a5498907a572cdf
SHA5129621201b8b6263e9a0d12c10c0c3d08a19f2aa78f0d96906260460ee40ceacf5fd6a196dc46e608301866af5dc48443c5a0f21ff8311db942e51ccc75593d124
-
Filesize
3.6MB
MD5d462aca4e6bc86ae2ebc0c3de913ff47
SHA19815368a0cf0ff9976340c863554ea1b4c6c340a
SHA256b50d7d597ec31063b8b555130b76dd8c35d9e0ecbbfd3cca5864b8da72792d8e
SHA5121eba86ff6ec6467b6eaef3b66ccc8ae06e1473b26c7a2340c360126723dbcccf03e977df0cc214967f7ed0663257119c87dae946089b53c05d6f85d40e7ae17b