Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 03:10
Static task
static1
Behavioral task
behavioral1
Sample
NovaSetup.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NovaSetup.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
20 signatures
150 seconds
General
-
Target
NovaSetup.exe
-
Size
4.1MB
-
MD5
9f5019341609a7b2bc1356a509520688
-
SHA1
aa7d86fb786baff5055c7581eb07a457fcf162b4
-
SHA256
0d33ab8f48e7046db2ef831c6297949734bb6dd8acd2e7d84afacfe2404454d1
-
SHA512
ff9e2d29758ae1305cf7b344c0a1094402738ed933ffc61440f45831a529ee25cbf18f13ca7e0648d16b5c6c4af4e89b95536a4c9c3332a5399876b582618b97
-
SSDEEP
98304:Tip6o9raOWcD9XdMPABIw/t6KHDiAwzUshkqXf0FZp:TcAOWs9XNBZ16M2HUykSI
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1088 NovaSetup.exe Token: SeDebugPrivilege 592 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1872 1088 NovaSetup.exe 28 PID 1088 wrote to memory of 1872 1088 NovaSetup.exe 28 PID 1088 wrote to memory of 1872 1088 NovaSetup.exe 28 PID 1088 wrote to memory of 1872 1088 NovaSetup.exe 28 PID 1872 wrote to memory of 592 1872 cmd.exe 30 PID 1872 wrote to memory of 592 1872 cmd.exe 30 PID 1872 wrote to memory of 592 1872 cmd.exe 30 PID 1872 wrote to memory of 592 1872 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NovaSetup.exe"C:\Users\Admin\AppData\Local\Temp\NovaSetup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Nova"2⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Nova"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-