Overview
overview
4Static
static
3.ses
windows7-x64
3.ses
windows10-2004-x64
3lu/nada_16...32.exe
windows7-x64
4lu/nada_16...32.exe
windows10-2004-x64
4lu/nada_16...xe.sig
windows7-x64
3lu/nada_16...xe.sig
windows10-2004-x64
3lu/nada_16...g.part
windows7-x64
3lu/nada_16...g.part
windows10-2004-x64
3~nsu.tmp/Au_.exe
windows7-x64
3~nsu.tmp/Au_.exe
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-05-2023 10:11
Static task
static1
Behavioral task
behavioral1
Sample
.ses
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
.ses
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
lu/nada_164_046d-uipak_x32.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
lu/nada_164_046d-uipak_x32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
lu/nada_164_046d-uipak_x32.exe.sig
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
lu/nada_164_046d-uipak_x32.exe.sig
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
lu/nada_164_046d-uipak_x32.exe.sig.part
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
lu/nada_164_046d-uipak_x32.exe.sig.part
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
~nsu.tmp/Au_.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
~nsu.tmp/Au_.exe
Resource
win10v2004-20230221-en
General
-
Target
lu/nada_164_046d-uipak_x32.exe.sig.part
-
Size
128B
-
MD5
5a66b387b64dcbcf0efb112e45efdbc2
-
SHA1
41b71680a94aaed96543788946375f60ca2cb2c7
-
SHA256
9c11ca931db98e5e229916dcdc569f23d53fed825404503a04d5db6d6732e83d
-
SHA512
f6e57f176efc930f44dc07ad4c66622e52371133e4e3ef3dd067aa0e0099989b61d4610a0b8a836f06f63943e9751bf131b358b3cfe2b20486b4c339bc7dedbf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\part_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.part rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.part\ = "part_auto_file" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1952 AcroRd32.exe 1952 AcroRd32.exe 1952 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1968 wrote to memory of 1148 1968 cmd.exe rundll32.exe PID 1968 wrote to memory of 1148 1968 cmd.exe rundll32.exe PID 1968 wrote to memory of 1148 1968 cmd.exe rundll32.exe PID 1148 wrote to memory of 1952 1148 rundll32.exe AcroRd32.exe PID 1148 wrote to memory of 1952 1148 rundll32.exe AcroRd32.exe PID 1148 wrote to memory of 1952 1148 rundll32.exe AcroRd32.exe PID 1148 wrote to memory of 1952 1148 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lu\nada_164_046d-uipak_x32.exe.sig.part1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lu\nada_164_046d-uipak_x32.exe.sig.part2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lu\nada_164_046d-uipak_x32.exe.sig.part"3⤵
- Suspicious use of SetWindowsHookEx
PID:1952
-
-