Loading ...

Play interactive tourEdit tour

Windows Analysis Report niPie.exe

Overview

General Information

Sample Name:niPie.exe
Analysis ID:502665
MD5:601fda01efb1a22e18a19793158b51fe
SHA1:925f30c4a425c133915ee92dd4c0900f31536c04
SHA256:5020bbc58ef082a5ac8e42e394c4235e88b9c5bd1ed3cdc126a24a649997ebf3
Infos:

Most interesting Screenshot:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Uses 32bit PE files
Found evasive API chain (may stop execution after accessing registry keys)
Sample file is different than original file name gathered from version info
Contains functionality to dynamically determine API calls
Found large amount of non-executed APIs
Program does not show much activity (idle)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function

Classification

Process Tree

  • System is w10x64
  • niPie.exe (PID: 6404 cmdline: 'C:\Users\user\Desktop\niPie.exe' MD5: 601FDA01EFB1A22E18A19793158B51FE)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: niPie.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: niPie.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00401460 RegEnumValueA,FindFirstFileA,FindNextFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
Source: niPie.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: niPie.exeString found in binary or memory: http://ocsp.thawte.com0
Source: niPie.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: niPie.exeString found in binary or memory: http://s.symcd.com06
Source: niPie.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: niPie.exeString found in binary or memory: http://s2.symcb.com0
Source: niPie.exeString found in binary or memory: http://sf.symcb.com/sf.crl0a
Source: niPie.exeString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: niPie.exeString found in binary or memory: http://sf.symcd.com0&
Source: niPie.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: niPie.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: niPie.exeString found in binary or memory: http://sv.symcd.com0&
Source: niPie.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: niPie.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: niPie.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: niPie.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: niPie.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: niPie.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: niPie.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: niPie.exeString found in binary or memory: http://www.symauth.com/rpa00
Source: niPie.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: niPie.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: niPie.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: niPie.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: niPie.exe, 00000000.00000002.355130521.000000000040F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWinNestInst.exe vs niPie.exe
Source: niPie.exeBinary or memory string: OriginalFilenameWinNestInst.exe vs niPie.exe
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00402100
Source: niPie.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\niPie.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: niPie.exeString found in binary or memory: /install
Source: niPie.exeString found in binary or memory: /install
Source: niPie.exeString found in binary or memory: ^@INSTALL\Software\National Instruments\Common\Installer\Pending\PackagesSoftware\National Instruments\Common\Installer\Pending\Deletes...%s\%s%s\*.*Value-ValueNameKeySoftware\National Instruments\Common\Installer\Pending\Registry\DeleteSoftware\National Instruments\Common\Installer\Pending\Registry\AddSoftware\National Instruments\Common\Installer\Pending\Registry/sREMOVEALL%s %s/remove"/install/test/qMutex FailedNested Install_MSIExecute/qnmSoftware\National Instruments\Common\Installer\Pending/undo%s ,\FeaturesTrueLaunchedByUpgrade\ProductsSoftware\National Instruments\Common\InstallerNIUPDMGRtrue
Source: classification engineClassification label: clean4.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\niPie.exeMutant created: \Sessions\1\BaseNamedObjects\_MSIExecute
Source: niPie.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00407AB8 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00402930 push eax; ret
Source: C:\Users\user\Desktop\niPie.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\niPie.exeAPI coverage: 6.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00401460 RegEnumValueA,FindFirstFileA,FindNextFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
Source: C:\Users\user\Desktop\niPie.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00407AB8 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\niPie.exeCode function: 0_2_00405644 GetVersionExA,GetEnvironmentVariableA,GetModuleFileNameA,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter2Path InterceptionPath InterceptionObfuscated Files or Information1OS Credential DumpingFile and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 502665 Sample: niPie.exe Startdate: 14/10/2021 Architecture: WINDOWS Score: 4 4 niPie.exe 2->4         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
niPie.exe0%VirustotalBrowse
niPie.exe0%MetadefenderBrowse
niPie.exe0%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0niPie.exefalse
    high
    http://www.symauth.com/cps0(niPie.exefalse
      high
      http://www.symauth.com/rpa00niPie.exefalse
        high
        http://ocsp.thawte.com0niPie.exefalse
        • URL Reputation: safe
        unknown

        Contacted IPs

        No contacted IP infos

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:502665
        Start date:14.10.2021
        Start time:08:36:49
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 2m 50s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:niPie.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean4.winEXE@1/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 100% (good quality ratio 97.2%)
        • Quality average: 87.1%
        • Quality standard deviation: 22.3%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        No created / dropped files found

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.892836892157124
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:niPie.exe
        File size:73664
        MD5:601fda01efb1a22e18a19793158b51fe
        SHA1:925f30c4a425c133915ee92dd4c0900f31536c04
        SHA256:5020bbc58ef082a5ac8e42e394c4235e88b9c5bd1ed3cdc126a24a649997ebf3
        SHA512:0db9ac45dfa3e4530fa4a945e3cac301e1ee8b26fc2690739741d72e1b7712e205f4bf83463e51c70df141af663ffa54c4e281d93f3bc386487a42eb1778a03c
        SSDEEP:768:gjan8GnhwDHcnrkqAAO8IEwm8iNWTGzvtKsDsoxm3whvI:gjanoDGrkbAO80mhN/ZKsDnmghw
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./..)k..zk..zk..z...zh..z...zx..z...zW..z...zc..z2..zl..zk..z,..zm..zo..z...zj..z...zj..zRichk..z................PE..L...j.I>...

        File Icon

        Icon Hash:00828e8e8686b000

        Static PE Info

        General

        Entrypoint:0x402d93
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x3E49816A [Tue Feb 11 23:04:10 2003 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:8fcbb82d712dc622f705d3815ebb3266

        Authenticode Signature

        Signature Valid:true
        Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 4/11/2016 5:00:00 PM 7/12/2019 4:59:59 PM
        Subject Chain
        • CN=National Instruments Corporation, O=National Instruments Corporation, L=Austin, S=Texas, C=US
        Version:3
        Thumbprint MD5:1C8D1A5469552A41DE716974A986D673
        Thumbprint SHA-1:70B8BA3A50BCDBAD1DC2C86C6DEB1D78215EA111
        Thumbprint SHA-256:4750C8643DF6099EA03EB3ADA1157EEFC149A3BAC6DBB31760A4DC0AFC41C007
        Serial:61C3329855F6476CFCB4FCF359E55909

        Entrypoint Preview

        Instruction
        push ebp
        mov ebp, esp
        push FFFFFFFFh
        push 00409140h
        push 004058E4h
        mov eax, dword ptr fs:[00000000h]
        push eax
        mov dword ptr fs:[00000000h], esp
        sub esp, 58h
        push ebx
        push esi
        push edi
        mov dword ptr [ebp-18h], esp
        call dword ptr [00409094h]
        xor edx, edx
        mov dl, ah
        mov dword ptr [0040CBE0h], edx
        mov ecx, eax
        and ecx, 000000FFh
        mov dword ptr [0040CBDCh], ecx
        shl ecx, 08h
        add ecx, edx
        mov dword ptr [0040CBD8h], ecx
        shr eax, 10h
        mov dword ptr [0040CBD4h], eax
        xor esi, esi
        push esi
        call 00007FAF40B425EFh
        pop ecx
        test eax, eax
        jne 00007FAF40B3FC5Ah
        push 0000001Ch
        call 00007FAF40B3FD05h
        pop ecx
        mov dword ptr [ebp-04h], esi
        call 00007FAF40B422BAh
        call dword ptr [00409090h]
        mov dword ptr [0040E108h], eax
        call 00007FAF40B42178h
        mov dword ptr [0040CBB4h], eax
        call 00007FAF40B41F21h
        call 00007FAF40B41E63h
        call 00007FAF40B41B80h
        mov dword ptr [ebp-30h], esi
        lea eax, dword ptr [ebp-5Ch]
        push eax
        call dword ptr [0040908Ch]
        call 00007FAF40B41DF4h
        mov dword ptr [ebp-64h], eax
        test byte ptr [ebp-30h], 00000001h
        je 00007FAF40B3FC58h
        movzx eax, word ptr [ebp-2Ch]
        jmp 00007FAF40B3FC55h
        push 0000000Ah
        pop eax
        push eax
        push dword ptr [ebp-64h]
        push esi
        push esi
        call dword ptr [00409088h]

        Rich Headers

        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        • [LNK] VC++ 6.0 SP5 build 8804

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x9bc00x72.rdata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x95480x64.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000xa20.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0xe0000x3fc0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x90000x140.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x77220x8000False0.566650390625COM executable for DOS6.39486324672IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .rdata0x90000xc320x1000False0.376708984375data4.52160108025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xa0000x410c0x3000False0.0714518229167data0.996089583315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0xf0000xa200x1000False0.26318359375data4.15843705735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_DIALOG0xf1300xa0dataEnglishUnited States
        RT_STRING0xf1d00x144dataGermanGermany
        RT_STRING0xf3140x132dataEnglishUnited States
        RT_STRING0xf4480x150dataFrenchFrance
        RT_STRING0xf5980xd8dataJapaneseJapan
        RT_VERSION0xf6700x3b0dataEnglishUnited States

        Imports

        DLLImport
        KERNEL32.dllReleaseMutex, WaitForSingleObjectEx, CreateThread, Sleep, lstrlenA, FindFirstFileA, FindNextFileA, FindClose, RemoveDirectoryA, CreateMutexA, ExitProcess, GetCurrentProcess, UnhandledExceptionFilter, FlushFileBuffers, ReadFile, CloseHandle, LoadLibraryA, GetProcAddress, SetStdHandle, HeapReAlloc, VirtualAlloc, GetStringTypeW, GetStringTypeA, SetFilePointer, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, DeleteFileA, GetCPInfo, GetACP, GetOEMCP, WideCharToMultiByte, MultiByteToWideChar, LCMapStringA, LCMapStringW, HeapAlloc, HeapFree, TerminateProcess, GetLastError, GetFileType, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, RtlUnwind, WriteFile
        USER32.dllSendMessageA, SetDlgItemTextA, MessageBoxA, EndDialog, LoadStringA, DialogBoxParamA
        ADVAPI32.dllRegOpenKeyExA, RegEnumKeyExA, RegEnumValueA, RegCloseKey, RegQueryValueExA, RegSetValueExA, RegDeleteValueA, RegCreateKeyExA, RegDeleteKeyA
        Msi.dll

        Exports

        NameOrdinalAddress
        RFL_RegSetBinary20x401aa0
        _RFL_RegGetBinary@2010x401a70

        Version Infos

        DescriptionData
        LegalCopyrightCopyright 2002-2017. All Rights Reserved.
        InternalNameWinNestInst
        FileVersion17.5.0.170
        CompanyNameNational Instruments
        PrivateBuild
        LegalTrademarks
        Comments
        ProductNameNational Instruments UM Satellite
        SpecialBuild
        ProductVersion17.5.0
        FileDescriptionWinNestInst
        OriginalFilenameWinNestInst.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        GermanGermany
        FrenchFrance
        JapaneseJapan

        Network Behavior

        No network behavior found

        Code Manipulations

        Statistics

        System Behavior

        General

        Start time:08:37:56
        Start date:14/10/2021
        Path:C:\Users\user\Desktop\niPie.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\niPie.exe'
        Imagebase:0x400000
        File size:73664 bytes
        MD5 hash:601FDA01EFB1A22E18A19793158B51FE
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >