Analysis
-
max time kernel
151s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe
Resource
win10v2004-20220812-en
General
-
Target
1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe
-
Size
144KB
-
MD5
39b3cdbe592fbfce5b7bca5eb66f009a
-
SHA1
5445a005346ec9b514c29371cbd18eed660abf14
-
SHA256
1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245
-
SHA512
0b0f00a6a5bd9defae9b3bf8882a5563f9411b2ac6ac5f62adda89a7d68613be17efea091d6e8bc64e69b1e6e950b20e4e3e43dcc28d8c84b1959d29310b0394
-
SSDEEP
3072:quKay2UNgieWnK80r5K8rbTx81JI/21AiXslNko4:quKawsvEKb181DAu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1064 msa.exe -
resource yara_rule behavioral1/memory/1940-55-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1064-60-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1940-62-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1940-63-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1064-64-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\NordBull = "C:\\Windows\\msa.exe" msa.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run msa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe File opened for modification C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe File created C:\Windows\msa.exe 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe File opened for modification C:\Windows\msa.exe 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe 1064 msa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 1064 msa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1064 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 28 PID 1940 wrote to memory of 1064 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 28 PID 1940 wrote to memory of 1064 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 28 PID 1940 wrote to memory of 1064 1940 1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe"C:\Users\Admin\AppData\Local\Temp\1ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5dbf6e2ee7c18bc16513140e4052c0795
SHA1879f3553346ac6d7526727b4e8d666694ed1ee68
SHA2568941661bc2bbb7b830574df81cdfbae1111e658dc8b715fae9eb1d10a091ea0f
SHA512b46869314670188f731f4b70f496e644e37afea7227c5365e885d47c97ecf62f743a29fc96484c63e8ca9b241f8bf83396f207c43080843cf66baf805906fcfb
-
Filesize
144KB
MD539b3cdbe592fbfce5b7bca5eb66f009a
SHA15445a005346ec9b514c29371cbd18eed660abf14
SHA2561ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245
SHA5120b0f00a6a5bd9defae9b3bf8882a5563f9411b2ac6ac5f62adda89a7d68613be17efea091d6e8bc64e69b1e6e950b20e4e3e43dcc28d8c84b1959d29310b0394
-
Filesize
144KB
MD539b3cdbe592fbfce5b7bca5eb66f009a
SHA15445a005346ec9b514c29371cbd18eed660abf14
SHA2561ff2fde994cd9791215a0c39e9611caf7b8ec449d2d82b6802ea1b08dd7d6245
SHA5120b0f00a6a5bd9defae9b3bf8882a5563f9411b2ac6ac5f62adda89a7d68613be17efea091d6e8bc64e69b1e6e950b20e4e3e43dcc28d8c84b1959d29310b0394