Overview
overview
10Static
static
1yyy.zip
windows7-x64
1yyy.zip
windows10-2004-x64
1HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
3NSM.lic
windows7-x64
3NSM.lic
windows10-2004-x64
3NSM.ini
windows7-x64
1NSM.ini
windows10-2004-x64
1PCICHEK.dll
windows7-x64
3PCICHEK.dll
windows10-2004-x64
3PCICL32.dll
windows7-x64
3PCICL32.dll
windows10-2004-x64
3TCCTL32.dll
windows7-x64
3TCCTL32.dll
windows10-2004-x64
3client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10client32.ini
windows7-x64
1client32.ini
windows10-2004-x64
1install_state.json
windows7-x64
3install_state.json
windows10-2004-x64
3msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3nskbfltr.inf
windows7-x64
1nskbfltr.inf
windows10-2004-x64
1nsm_vpro.ini
windows7-x64
1nsm_vpro.ini
windows10-2004-x64
1pcicapi.dll
windows7-x64
3pcicapi.dll
windows10-2004-x64
3remcmdstub.exe
windows7-x64
3remcmdstub.exe
windows10-2004-x64
3temp/ie_to...ho.dll
windows10-2004-x64
3temp/ie_to...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
18s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
yyy.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yyy.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HTCTL32.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
HTCTL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
NSM.lic
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
NSM.lic
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
NSM.ini
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
NSM.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PCICHEK.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
PCICL32.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
PCICL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
TCCTL32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
TCCTL32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
client32.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
client32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
client32.ini
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
client32.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
install_state.json
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
install_state.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
msvcr100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
nskbfltr.inf
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
nskbfltr.inf
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
nsm_vpro.ini
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
nsm_vpro.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
pcicapi.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
pcicapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
remcmdstub.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
remcmdstub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
temp/ie_to_edge_bho.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
temp/ie_to_edge_bho_64.dll
Resource
win10v2004-20241007-en
General
-
Target
client32.ini
-
Size
671B
-
MD5
1f3911aa581f74218174a75d1d44aebe
-
SHA1
67cac52f8457c77a93338109d6615145d1148e17
-
SHA256
010dc2cdbdbca9199aca04a93165259b48bbacaafd142d0597e2b168b0c7809e
-
SHA512
c5d825bcd2c44f8e83ef1b3a0f185f93c23e365cff55051231c676fc5b68dbf50ef7a6a466e1b2fd3b3c942b68270207e08eb18aba04e768226419c8054ad30f
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2980 NOTEPAD.EXE