Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe
Resource
win10v2004-20230220-en
General
-
Target
77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe
-
Size
3.4MB
-
MD5
b010c5dfc2c75507335869a54e63248c
-
SHA1
ea687006c094ee290490c862ec007e19d9759751
-
SHA256
77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf
-
SHA512
15d480a3c00be751e37a3ccdf1bd3477b37c7737602c0ea2105ec3aca54e2aaa2c4e583d0d62f35d6194cc22051a2645a42f73ec34b21cb0f6f14b3b3f6c02ec
-
SSDEEP
49152:VCyC+IxkuiFlGBIkHPOokeW3rfoSD+s8KuqGaX0ToIBAUZLYGU/:FDGBIkv3k3rfz4JBAUZLI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 NSUDOLC.exe -
Loads dropped DLL 1 IoCs
pid Process 1464 cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 800 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 836 NSUDOLC.exe 836 NSUDOLC.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe Token: SeDebugPrivilege 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe Token: SeDebugPrivilege 800 taskkill.exe Token: SeDebugPrivilege 836 NSUDOLC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1464 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 27 PID 2032 wrote to memory of 1464 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 27 PID 2032 wrote to memory of 1464 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 27 PID 2032 wrote to memory of 1464 2032 77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe 27 PID 1464 wrote to memory of 800 1464 cmd.exe 29 PID 1464 wrote to memory of 800 1464 cmd.exe 29 PID 1464 wrote to memory of 800 1464 cmd.exe 29 PID 1464 wrote to memory of 800 1464 cmd.exe 29 PID 1464 wrote to memory of 836 1464 cmd.exe 31 PID 1464 wrote to memory of 836 1464 cmd.exe 31 PID 1464 wrote to memory of 836 1464 cmd.exe 31 PID 1464 wrote to memory of 836 1464 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe"C:\Users\Admin\AppData\Local\Temp\77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /PID 20323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\NSUDOLC.exeNSUDOLC /U:S /P:E C:\Users\Admin\AppData\Local\Temp\77f1b71ba4606e55a50c4c9112f98e4054a262954bbb9bfb864453f5d8253edf.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910
-
Filesize
145B
MD5509142f6b608ea7d1f6db2c85dbd15be
SHA11068667442c8c47117ea21c5824a62b46e93b43f
SHA2565a0910a3bdf9b8737cd4b324b41991ccff6a8f9e8390f124c94c2324026f208c
SHA512f41a96b97389c5b75343f204f41b13c3590e0ee2790ab2d8bfef6060f57c9bb6600478cfce2e6151284391d0a1fd3dd06ce2695e0bc478e960935b1398874091
-
Filesize
145B
MD5509142f6b608ea7d1f6db2c85dbd15be
SHA11068667442c8c47117ea21c5824a62b46e93b43f
SHA2565a0910a3bdf9b8737cd4b324b41991ccff6a8f9e8390f124c94c2324026f208c
SHA512f41a96b97389c5b75343f204f41b13c3590e0ee2790ab2d8bfef6060f57c9bb6600478cfce2e6151284391d0a1fd3dd06ce2695e0bc478e960935b1398874091
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910