Overview
overview
10Static
static
10niha-main/OmNom.exe
windows10-ltsc_2021-x64
10niha-main/alfa.exe
windows10-ltsc_2021-x64
8niha-main/derq.exe
windows10-ltsc_2021-x64
10niha-main/...af.exe
windows10-ltsc_2021-x64
7niha-main/...dr.exe
windows10-ltsc_2021-x64
7niha-main/...ra.exe
windows10-ltsc_2021-x64
10niha-main/kiprea2.exe
windows10-ltsc_2021-x64
10niha-main/kkk.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/...wr.exe
windows10-ltsc_2021-x64
10niha-main/...ij.exe
windows10-ltsc_2021-x64
10niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/...sr.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/opiww1.exe
windows10-ltsc_2021-x64
10niha-main/...na.exe
windows10-ltsc_2021-x64
10niha-main/...t1.exe
windows10-ltsc_2021-x64
10niha-main/...ad.exe
windows10-ltsc_2021-x64
niha-main/...ed.exe
windows10-ltsc_2021-x64
8niha-main/pypdwat.exe
windows10-ltsc_2021-x64
7niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/robobob.exe
windows10-ltsc_2021-x64
10niha-main/swi.exe
windows10-ltsc_2021-x64
10niha-main/thiakdc.exe
windows10-ltsc_2021-x64
10niha-main/...ka.exe
windows10-ltsc_2021-x64
8niha-main/time.exe
windows10-ltsc_2021-x64
10niha-main/vosemOO.exe
windows10-ltsc_2021-x64
10niha-main/wint1.exe
windows10-ltsc_2021-x64
10niha-main/wint2.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
16/04/2025, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
niha-main/OmNom.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
niha-main/alfa.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral3
Sample
niha-main/derq.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral4
Sample
niha-main/inktkisaf.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral5
Sample
niha-main/iotjsjawdr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
niha-main/iylksfkktra.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral7
Sample
niha-main/kiprea2.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral8
Sample
niha-main/kkk.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
niha-main/liladertoas.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
niha-main/lporjgjsawr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
niha-main/mbyoitksfjkyij.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral12
Sample
niha-main/mixerat12.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
niha-main/nerialtersr.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral14
Sample
niha-main/ninahoooas.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral15
Sample
niha-main/opiww1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral16
Sample
niha-main/plorestoana.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral17
Sample
niha-main/poratertosat1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral18
Sample
niha-main/pothgkjad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
niha-main/potphbksed.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
niha-main/pypdwat.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
niha-main/rigosae12.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral22
Sample
niha-main/robobob.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral23
Sample
niha-main/swi.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral24
Sample
niha-main/thiakdc.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral25
Sample
niha-main/tiadktka.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral26
Sample
niha-main/time.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral27
Sample
niha-main/vosemOO.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
niha-main/wint1.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
niha-main/kkk.exe
-
Size
12.5MB
-
MD5
4d9728a6c062cfa93ec0e5b18f67f436
-
SHA1
bcf5dc9253e785c561261ccefd3b0485adaa3748
-
SHA256
77af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
-
SHA512
74ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537
-
SSDEEP
393216:FMMj6uIhwiF20XBou0GmG/pUTfNF88FH8vmg2b5:CgbIBF2IaCpUTfNF8qH8vLw5
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral8/memory/2624-14-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-18-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-19-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-16-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-23-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-24-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-25-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-27-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-26-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-21-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-17-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-15-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-13-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-12-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-29-0x0000000140000000-0x000000014082C000-memory.dmp xmrig behavioral8/memory/2624-30-0x0000000140000000-0x000000014082C000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5108 helper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 45 pastebin.com 44 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5108 set thread context of 5728 5108 helper.exe 99 PID 5108 set thread context of 2624 5108 helper.exe 100 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5088 sc.exe 548 sc.exe 5032 sc.exe 2820 sc.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 kkk.exe 3480 kkk.exe 3480 kkk.exe 3480 kkk.exe 5108 helper.exe 5108 helper.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2624 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 5728 5108 helper.exe 99 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100 PID 5108 wrote to memory of 2624 5108 helper.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\niha-main\kkk.exe"C:\Users\Admin\AppData\Local\Temp\niha-main\kkk.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Helper"2⤵
- Launches sc.exe
PID:5088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Helper" binpath= "C:\ProgramData\Google\Chrome\helper.exe" start= "auto"2⤵
- Launches sc.exe
PID:548
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:5032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Helper"2⤵
- Launches sc.exe
PID:2820
-
-
C:\ProgramData\Google\Chrome\helper.exeC:\ProgramData\Google\Chrome\helper.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5728
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD54d9728a6c062cfa93ec0e5b18f67f436
SHA1bcf5dc9253e785c561261ccefd3b0485adaa3748
SHA25677af16a3bb1d762ceee56acc22bdf10d1945c007a4ecf6504e991f8f4e1588e9
SHA51274ea12d3537c4d520296193c9bf481a367fa382ad1d131c9d67b048911f79cfd01325da17a6eb9d88048e63b10b2bb23db98c082a68ad81d3b74576302e92537