Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe
Resource
win10v2004-20230915-en
General
-
Target
3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe
-
Size
1.7MB
-
MD5
2de855006a7492038d0a986df055f00c
-
SHA1
a0b60a0221acdba3afe757dede3589b027e199a7
-
SHA256
3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91
-
SHA512
5a136f440e60ebf5ee40b413184ffc53043c25f0f4565314cda88dfb921072e65e42fe4506ba7533fd37c8c6b8364456b71eb61cb3c1538584977436c8e91ce8
-
SSDEEP
49152:xEJ4ZN5SDtKmLZvc7VtQ1VGfGJry0BXQr09:V35SxKmedfGJr7f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3064 Nsudo.dat -
Loads dropped DLL 1 IoCs
pid Process 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3064 Nsudo.dat 3064 Nsudo.dat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 18446744065119617044 3064 Nsudo.dat -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3064 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe 29 PID 2112 wrote to memory of 3064 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe 29 PID 2112 wrote to memory of 3064 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe 29 PID 2112 wrote to memory of 3064 2112 3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe"C:\Users\Admin\AppData\Local\Temp\3e1a9e90f8eda5a015553701665af2e633980b1da8e4deb299a8ab192a548f91.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Nsudo.datC:\Users\Admin\AppData\Local\Temp\Nsudo.dat -U:T -P:E -M:S -Priority:RealTime C:\Users\Admin\AppData\Local\Temp\1.dat2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD52aa7969952a18b16149f6aae733ae005
SHA1f03111b63470fe024a6ca00f7f4021e60a62b599
SHA25673193a43e3876d22300e7f085c5a4c5574d6a4b40f975fe9df71c8380db11615
SHA512bba69ec4899ce6fe821eb78cdf14c84127576404e69fe09d6c9961a31a4be1c902579b14134bb9a3a38339ad254bce9856e0cfd0cdd4334b1fea8d43a4f71b5d
-
Filesize
233KB
MD52aa7969952a18b16149f6aae733ae005
SHA1f03111b63470fe024a6ca00f7f4021e60a62b599
SHA25673193a43e3876d22300e7f085c5a4c5574d6a4b40f975fe9df71c8380db11615
SHA512bba69ec4899ce6fe821eb78cdf14c84127576404e69fe09d6c9961a31a4be1c902579b14134bb9a3a38339ad254bce9856e0cfd0cdd4334b1fea8d43a4f71b5d