Analysis
-
max time kernel
51s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Nos317.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nos317.exe
Resource
win10v2004-20230220-en
General
-
Target
Nos317.exe
-
Size
127KB
-
MD5
1b957de2481264f0838b2ea58fefcd2b
-
SHA1
ea4347f9d234e6ca737298fde05c8b93dd7829fd
-
SHA256
ae94787c102c6b1c26f45413be4b123a8b2c1dc7ad7f9d1b9c86a489ac8c47c7
-
SHA512
f96388b8b415eb2cb762760b614153b449330cf0f2b0b09ccf6d8932b2fe5b13dc0d5a9187bd3b1ab6e20175f9c2ede9d631c9bcd2d076a77a3a8c357758be7e
-
SSDEEP
3072:3cpE7eK4faKrdTuKorWwj432v7xPKs+RO+GLVWxXu44444:37yfzdTujpi2T9sRObAD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
Nos317.execsmm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\csmm.exe" Nos317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\csmm.exe" csmm.exe -
Processes:
resource yara_rule C:\Windows\Client.exe aspack_v212_v242 C:\Windows\Client.exe aspack_v212_v242 -
Executes dropped EXE 3 IoCs
Processes:
Client.execsmm.execsmm.exepid process 1956 Client.exe 656 csmm.exe 1324 csmm.exe -
Loads dropped DLL 4 IoCs
Processes:
Nos317.execsmm.exepid process 1992 Nos317.exe 1992 Nos317.exe 656 csmm.exe 656 csmm.exe -
Drops file in System32 directory 2 IoCs
Processes:
Nos317.execsmm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\csmm.exe Nos317.exe File opened for modification C:\Windows\SysWOW64\csmm.exe csmm.exe -
Drops file in Windows directory 1 IoCs
Processes:
Nos317.exedescription ioc process File opened for modification C:\Windows\Client.exe Nos317.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Nos317.execsmm.exepid process 1992 Nos317.exe 656 csmm.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Nos317.exeClient.execsmm.execsmm.exepid process 1992 Nos317.exe 1956 Client.exe 656 csmm.exe 1324 csmm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Nos317.execsmm.exedescription pid process target process PID 1992 wrote to memory of 1956 1992 Nos317.exe Client.exe PID 1992 wrote to memory of 1956 1992 Nos317.exe Client.exe PID 1992 wrote to memory of 1956 1992 Nos317.exe Client.exe PID 1992 wrote to memory of 1956 1992 Nos317.exe Client.exe PID 1992 wrote to memory of 656 1992 Nos317.exe csmm.exe PID 1992 wrote to memory of 656 1992 Nos317.exe csmm.exe PID 1992 wrote to memory of 656 1992 Nos317.exe csmm.exe PID 1992 wrote to memory of 656 1992 Nos317.exe csmm.exe PID 656 wrote to memory of 1324 656 csmm.exe csmm.exe PID 656 wrote to memory of 1324 656 csmm.exe csmm.exe PID 656 wrote to memory of 1324 656 csmm.exe csmm.exe PID 656 wrote to memory of 1324 656 csmm.exe csmm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nos317.exe"C:\Users\Admin\AppData\Local\Temp\Nos317.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Client.exe"C:\Windows\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\csmm.exeC:\Windows\system32\csmm.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\csmm.exeC:\Windows\system32\csmm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Client.exeFilesize
88KB
MD55320073f5533b7da2a61ccea68086f7d
SHA1a2a1d62861506464722e643420967ce55aac6594
SHA25650d82863c8577e8f9f4d8a3fbc6f739c0e1c3605a9df61bea27d7ddb8e85cfdd
SHA512d34edd63fcffd82f0260f4b553cb549154a1c8f6e80e14842769fa3860e17c8787b80f2698ee1ec3c891be3a58e0a3c87fbd889c9117dcbb65e06b9d20a7759f
-
C:\Windows\Client.exeFilesize
88KB
MD55320073f5533b7da2a61ccea68086f7d
SHA1a2a1d62861506464722e643420967ce55aac6594
SHA25650d82863c8577e8f9f4d8a3fbc6f739c0e1c3605a9df61bea27d7ddb8e85cfdd
SHA512d34edd63fcffd82f0260f4b553cb549154a1c8f6e80e14842769fa3860e17c8787b80f2698ee1ec3c891be3a58e0a3c87fbd889c9117dcbb65e06b9d20a7759f
-
C:\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
C:\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
C:\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
C:\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
\Windows\SysWOW64\csmm.exeFilesize
39KB
MD505cf2889903f75d04055e3c4d2dc17f0
SHA1c13c3b9f03cc5c18fd2d10037860b2c48727fc54
SHA256b2ca80ff62fb9f9cc2289066321c7448d96451959f86c2225e8e51b7d2517d21
SHA51240b9a6f14682ec77642ba1803cd0b00bc8d2fad2545881f4795b49943f17e993d466a1be9cfbce85091c0a696eb6990db8bec52dffa7aa0a062b9f06265bc9af
-
memory/656-84-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1324-83-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1956-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1992-65-0x0000000001E40000-0x0000000001E6F000-memory.dmpFilesize
188KB
-
memory/1992-85-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1992-86-0x0000000001E40000-0x0000000001E42000-memory.dmpFilesize
8KB