Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 17:35
Static task
static1
Behavioral task
behavioral1
Sample
nonia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
nonia.exe
Resource
win10v2004-20250207-en
General
-
Target
nonia.exe
-
Size
6.9MB
-
MD5
cd2b81a5b3709ce225dd36155fcc03ff
-
SHA1
79392c7e57ea1638c45e889130a42ac01cd989cd
-
SHA256
1ba86c6926a17e77c941f65901e97d88b20bf2508e1d75adf2495344022c4511
-
SHA512
5813cd0596d3d2b799538e0404a9a7141c4cc764737c04e0402f27c34ed3d076641f255b7420fd662fbb5a73cf287b810e314888709cea7709bbfb13cfeeebc4
-
SSDEEP
98304:rt2cot2nE0QOVqf0oisTLhLh/ExNqoT3K4zLuY7CqwGg/KqC4g5SZtmaoXAPn54E:rtnit0odL//ExNqoTaALuHwoQa
Malware Config
Extracted
cryptbot
http://home.fortenb14vs.top/YEmCCeRRAnLfomQYkhCt57
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Set-up.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 49 1424 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2573923862-3221519550-2669654151-1000\Control Panel\International\Geo\Nation nonia.exe -
Executes dropped EXE 2 IoCs
pid Process 2344 LummaC2.exe 4452 Set-up.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0009000000023da0-14.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nonia.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3740 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe 4452 Set-up.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2344 1596 nonia.exe 91 PID 1596 wrote to memory of 2344 1596 nonia.exe 91 PID 1596 wrote to memory of 2344 1596 nonia.exe 91 PID 1596 wrote to memory of 4452 1596 nonia.exe 92 PID 1596 wrote to memory of 4452 1596 nonia.exe 92 PID 1596 wrote to memory of 4452 1596 nonia.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\nonia.exe"C:\Users\Admin\AppData\Local\Temp\nonia.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4MTUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE1MzQzMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzI0MTE3MzY1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD58da89b163d506be4a73b987517a1b9e4
SHA12e110cf5160c511fa3d5843e890b8e9316754f34
SHA256ea56e7f640355598346fa0b356699298314e25d809f3aa7cfce1804a3d1964e5
SHA512a85969bcda0b31caf0cec79f45bec068a498c7ac190fe17d7b7c03f88f5c91f5f6221fcc4fcb46604695d5b95e9047dfc1d2cf31207540c23e929fcca08d14f5
-
Filesize
6.6MB
MD520b05fdf49dd701d4909c9297fad4299
SHA1038202216057ccb9b7b8033f037f575204968e34
SHA2562731f544c596e1879e5547eb11557dea0858849388cad25c91057f08ac31328b
SHA51218b6d1414d1e47671c62c9ca6a933af6792be113067d57c990aa43bd1a034c0d788afd48aba04f687c69fe70d9f35825bc1a5b40d4a4b4573b76b23ec5a4ae1c