Analysis
-
max time kernel
62s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 16:10
Behavioral task
behavioral1
Sample
Night Injector/night.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Night Injector/night.exe
Resource
win10v2004-20241007-en
General
-
Target
Night Injector/night.exe
-
Size
7.6MB
-
MD5
d06d10e244ad73a3845d4676d8a9f549
-
SHA1
31c4177f94385598a1b2dbcb0e7940933fdd0f06
-
SHA256
344c3a9a59f12de099ba69d2563fe75612b600d0890e075eb1cac474ce7446e9
-
SHA512
bccd783c30d579e2ef7e8a49c8ea3457a9c68c46d5ff49babdcc046dc82eae5a0ec329286e161298c7b3affc875fb43b115d0b6625eed988ebb90de650952164
-
SSDEEP
196608:S6D+kdSAwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW:H5QIHL7HmBYXrYoaUN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2068 night.exe -
resource yara_rule behavioral1/files/0x000500000001a463-21.dat upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2068 2600 night.exe 29 PID 2600 wrote to memory of 2068 2600 night.exe 29 PID 2600 wrote to memory of 2068 2600 night.exe 29 PID 2716 wrote to memory of 2940 2716 chrome.exe 31 PID 2716 wrote to memory of 2940 2716 chrome.exe 31 PID 2716 wrote to memory of 2940 2716 chrome.exe 31 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 2132 2716 chrome.exe 33 PID 2716 wrote to memory of 1800 2716 chrome.exe 34 PID 2716 wrote to memory of 1800 2716 chrome.exe 34 PID 2716 wrote to memory of 1800 2716 chrome.exe 34 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35 PID 2716 wrote to memory of 2616 2716 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Night Injector\night.exe"C:\Users\Admin\AppData\Local\Temp\Night Injector\night.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Night Injector\night.exe"C:\Users\Admin\AppData\Local\Temp\Night Injector\night.exe"2⤵
- Loads dropped DLL
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb9c9758,0x7fefb9c9768,0x7fefb9c97782⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:22⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1552 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1648 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1844 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:12⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1548 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1128 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:22⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1264 --field-trial-handle=1224,i,2692245116587138907,5865477809518017846,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
933B
MD5c333daadaf421107c6824598786a1593
SHA11fca4bbf5489a108d73c60f59ed2cded60fedd56
SHA25605ff0e06111680aac824bdb14c496c6ceb2088ab67f76f1f1e8e80caf89c922a
SHA5125e13cc5f0b54c4d23717b8f87a6020b86a8c370262a9e08c310ccab1358ab9564d647c8ab23a8ddb3f48e0346476cbc20e2e2eb1409ee0d80210eb4f94f5f601
-
Filesize
4KB
MD57f453023d5902c1d054f7a58f77bd90e
SHA19dd8a1a012c19321066aadbab57f65d6a0ceb1f4
SHA256c662b4a3e6ed995a663ec2b55c273db42857248168dd58b73eae8a7a1b5f05b7
SHA512721af4b01695e51a0c05a5f579e94c6830f6f32c8534a03ce97f35d2f60022838cc47bc876c1c33368ac066d798295bb0551be289eb22f402a41378316b4e033
-
Filesize
4KB
MD536be6dc33e43f9b0813cfb2cde3186f8
SHA1c2678226b1b9eac96b27345f3a9aad2151230441
SHA2567322fca5526733498da2fd1e8cd22168430d11be0c6815148dc778ad491e7bf1
SHA512aff79854931c930a42edb54f05ad1ad9e637474e536586c9eb4d895aae1fb3de13967beb16c35bfbdb607da15231cfdfb8ed0c9862f9d581d21e52a00829dcff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.8MB
MD59a3d3ae5745a79d276b05a85aea02549
SHA1a5e60cac2ca606df4f7646d052a9c0ea813e7636
SHA25609693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889
SHA51246840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69