Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 00:27

General

  • Target

    fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe

  • Size

    153KB

  • MD5

    0fa4f31473f6497da9759c52d56f2e9d

  • SHA1

    5b603f74b9dd2657ae77a3472e5024867a5068df

  • SHA256

    fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176

  • SHA512

    40caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a

  • SSDEEP

    1536:o/T2X/jN2vxZz0DTHUpouvTzPP5yCyo14uGkeQwHF++IYwqmIy0xE+1oPsp:obG7N2kDTHUpouvX3QgCXTy0Pcu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe
    "C:\Users\Admin\AppData\Local\Temp\fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsy6969.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          68b287f4067ba013e34a1339afdb1ea8

          SHA1

          45ad585b3cc8e5a6af7b68f5d8269c97992130b3

          SHA256

          18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026

          SHA512

          06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

        • C:\Users\Admin\AppData\Local\Temp\nsy6969.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          6c3f8c94d0727894d706940a8a980543

          SHA1

          0d1bcad901be377f38d579aafc0c41c0ef8dcefd

          SHA256

          56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

          SHA512

          2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

        • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

          Filesize

          153KB

          MD5

          0fa4f31473f6497da9759c52d56f2e9d

          SHA1

          5b603f74b9dd2657ae77a3472e5024867a5068df

          SHA256

          fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176

          SHA512

          40caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a

        • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

          Filesize

          153KB

          MD5

          0fa4f31473f6497da9759c52d56f2e9d

          SHA1

          5b603f74b9dd2657ae77a3472e5024867a5068df

          SHA256

          fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176

          SHA512

          40caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a