Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 17:56
Behavioral task
behavioral1
Sample
KINGDOM/CE_punch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KINGDOM/CE_punch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KINGDOM/NewX.vmp.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
KINGDOM/NewX.vmp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
KINGDOM/lua53-64.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
KINGDOM/lua53-64.dll
Resource
win10v2004-20241007-en
General
-
Target
KINGDOM/NewX.vmp.exe
-
Size
10.1MB
-
MD5
410912bf0fb6f35648644fe15f0db3fd
-
SHA1
6e2d57b868372e22b318e79a2bd6da4c2902e75e
-
SHA256
e8220c82de5497eecd9b6a92210d6dbac2e1f0b17dc18ef81cbdafbd61a376da
-
SHA512
9b3966a2300682f84d3fe41958943c3dbf2b73a8209ee749338a76bf60f240367fa185cb5c80570dca2d539c2e2c7546a462e2b72c3be2887e16253895841c1c
-
SSDEEP
196608:lfVjfV9N6JdZIVg48vXBzQN8MEJoUTFBYSg8t/9bG06GiOF:/jfV9sNIq48vXBcNQJoIFSSg8L6XnOF
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/524-38-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-41-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-42-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-49-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-50-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-51-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-52-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-53-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-54-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral3/memory/524-55-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect -
Drops file in System32 directory 53 IoCs
description ioc Process File opened for modification C:\Windows\system32\USP10.dll NewX.vmp.exe File opened for modification C:\Windows\system32\uxtheme.dll NewX.vmp.exe File opened for modification C:\Windows\system32\hhctrl.ocx NewX.vmp.exe File opened for modification C:\Windows\system32\USER32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\DDRAW.dll NewX.vmp.exe File opened for modification C:\Windows\system32\psapi.dll NewX.vmp.exe File opened for modification C:\Windows\system32\DUI70.dll NewX.vmp.exe File opened for modification C:\Windows\system32\RPCRT4.dll NewX.vmp.exe File opened for modification C:\Windows\system32\msimg32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\propsys.dll NewX.vmp.exe File opened for modification C:\Windows\system32\LPK.dll NewX.vmp.exe File opened for modification C:\Windows\system32\SETUPAPI.dll NewX.vmp.exe File opened for modification C:\Windows\system32\shell32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\SHLWAPI.dll NewX.vmp.exe File opened for modification C:\Windows\system32\GLU32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\CFGMGR32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\WTSAPI32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\iertutil.dll NewX.vmp.exe File opened for modification C:\Windows\system32\KERNELBASE.dll NewX.vmp.exe File opened for modification C:\Windows\system32\wsock32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll NewX.vmp.exe File opened for modification C:\Windows\system32\profapi.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll NewX.vmp.exe File opened for modification C:\Windows\system32\msvcrt.dll NewX.vmp.exe File opened for modification C:\Windows\system32\version.dll NewX.vmp.exe File opened for modification C:\Windows\system32\opengl32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-core-synch-l1-2-0.DLL NewX.vmp.exe File opened for modification C:\Windows\system32\advapi32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\ws2_32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\NSI.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0.dll NewX.vmp.exe File opened for modification C:\Windows\system32\CLBCatQ.DLL NewX.vmp.exe File opened for modification C:\Windows\system32\explorerframe.dll NewX.vmp.exe File opened for modification C:\Windows\system32\shfolder.dll NewX.vmp.exe File opened for modification C:\Windows\system32\ole32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0.dll NewX.vmp.exe File opened for modification C:\Windows\system32\DCIMAN32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\dwmapi.dll NewX.vmp.exe File opened for modification C:\Windows\system32\MSCTF.dll NewX.vmp.exe File opened for modification C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0.dll NewX.vmp.exe File opened for modification C:\Windows\system32\oleaut32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\GDI32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\wininet.dll NewX.vmp.exe File opened for modification C:\Windows\system32\normaliz.DLL NewX.vmp.exe File opened for modification C:\Windows\system32\kernel32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\DEVOBJ.dll NewX.vmp.exe File opened for modification C:\Windows\system32\comdlg32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\imagehlp.dll NewX.vmp.exe File opened for modification C:\Windows\system32\imm32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\DUser.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\sechost.dll NewX.vmp.exe File opened for modification C:\Windows\system32\CRYPTBASE.dll NewX.vmp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_fa396087175ac9ac\comctl32.dll NewX.vmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 524 NewX.vmp.exe 524 NewX.vmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 524 NewX.vmp.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 524 NewX.vmp.exe Token: SeTcbPrivilege 524 NewX.vmp.exe Token: SeTcbPrivilege 524 NewX.vmp.exe Token: SeLoadDriverPrivilege 524 NewX.vmp.exe Token: SeCreateGlobalPrivilege 524 NewX.vmp.exe Token: SeLockMemoryPrivilege 524 NewX.vmp.exe Token: 33 524 NewX.vmp.exe Token: SeSecurityPrivilege 524 NewX.vmp.exe Token: SeTakeOwnershipPrivilege 524 NewX.vmp.exe Token: SeManageVolumePrivilege 524 NewX.vmp.exe Token: SeBackupPrivilege 524 NewX.vmp.exe Token: SeCreatePagefilePrivilege 524 NewX.vmp.exe Token: SeShutdownPrivilege 524 NewX.vmp.exe Token: SeRestorePrivilege 524 NewX.vmp.exe Token: 33 524 NewX.vmp.exe Token: SeIncBasePriorityPrivilege 524 NewX.vmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 524 NewX.vmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KINGDOM\NewX.vmp.exe"C:\Users\Admin\AppData\Local\Temp\KINGDOM\NewX.vmp.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:524