Analysis
-
max time kernel
57s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe
Resource
win10v2004-20221111-en
General
-
Target
af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe
-
Size
178KB
-
MD5
78c9f49106482e651dcd8d8198edecd7
-
SHA1
a4b2f890a32027f62c487ca891df32752c5c2c24
-
SHA256
af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17
-
SHA512
28e03b4b02737837df94df5924ca55a7c14bf0ac8044564a6ef13177250eaf5c8ed47a2eb7868491929a8845719de6803f426b75a8934797f8247a987fc8ced4
-
SSDEEP
3072:RnOn7t7XpdpCCTg/sxFgJgAG7uDC4fvS2v2C/AQHLSO9kOaZCMfb6EoHakqfTcPQ:RKpdcCrTLAGf9yH2OqJoHPPTE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 904 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 northstar.exe 904 northstar.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 904 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe 28 PID 1276 wrote to memory of 904 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe 28 PID 1276 wrote to memory of 904 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe 28 PID 1276 wrote to memory of 904 1276 af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe"C:\Users\Admin\AppData\Local\Temp\af9d63a1cb42cab4b44ac8db4f01fc8af4b838e46ed7eacf7ad13754b0a53a17.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\nsoD3C6.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsoD3C6.tmp\northstar.exe /dT201303201443 /u511a08f8-d444-49ec-a50d-7f125bc06f2f /e56143612⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5a767c2de2a3aa84e70da1230b2dd8f26
SHA192fc3b006b30b37e699d0cd1069391f3edd09fc8
SHA256272ee7f5bffe70f329cfe9fcd7d61eb7a34c4dc2c5de3a6f5fd078962dcde7d3
SHA5122beb66dad6db97d856cfe05daef19f3368c310ae10f27b90a541ae3be2ac15d6de0c2983df6d3b0f9722240bbd39e80ab9f0ef57e00eae16b72f3c98742e0496
-
Filesize
257KB
MD5a767c2de2a3aa84e70da1230b2dd8f26
SHA192fc3b006b30b37e699d0cd1069391f3edd09fc8
SHA256272ee7f5bffe70f329cfe9fcd7d61eb7a34c4dc2c5de3a6f5fd078962dcde7d3
SHA5122beb66dad6db97d856cfe05daef19f3368c310ae10f27b90a541ae3be2ac15d6de0c2983df6d3b0f9722240bbd39e80ab9f0ef57e00eae16b72f3c98742e0496
-
Filesize
10KB
MD520ee82203544c4f831a7dc1650e7ec51
SHA1671affb8e32f06777483782197173af254e02548
SHA25669a00c14562ea5a71f6196b307292fa6d8b1a2fc02368020f40c84b3b0a1a83a
SHA5124dabcc0cfebb36cfe57fa05777224f45c04c84031cfecf4184bd95d2b148ce18a6c91655320e69c1709e740a261e1e25effc8395fed91d0fc61b18f9a9f7685f
-
Filesize
257KB
MD5a767c2de2a3aa84e70da1230b2dd8f26
SHA192fc3b006b30b37e699d0cd1069391f3edd09fc8
SHA256272ee7f5bffe70f329cfe9fcd7d61eb7a34c4dc2c5de3a6f5fd078962dcde7d3
SHA5122beb66dad6db97d856cfe05daef19f3368c310ae10f27b90a541ae3be2ac15d6de0c2983df6d3b0f9722240bbd39e80ab9f0ef57e00eae16b72f3c98742e0496