Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
NEBULA OSC/NebulaOSC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEBULA OSC/NebulaOSC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEBULA OSC/NebulaOSC.exe
-
Size
1.5MB
-
MD5
d3afb4ad345f7dd766cf48f6c225b6c0
-
SHA1
81770566a842c3ef4ff306f2f9dbfde44e84d9eb
-
SHA256
fdd2f4e79f4970ca1bbdf4215e72483e43d4cc0f08e3932640c767c04fd41639
-
SHA512
621dafd13d2828d299b33790ad51bc315bb51c11187661605267dfe8355e7247848362c443bed47d7dc5ff9487fda8bed0186820c46cb67bfb526e3b147d703c
-
SSDEEP
49152:N/4M779Rck9tV5w1ZvLl7XrOOliyea7m:NdDUvLl7XrO/xAm
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: NebulaOSC.exe File opened (read-only) \??\N: NebulaOSC.exe File opened (read-only) \??\O: NebulaOSC.exe File opened (read-only) \??\P: NebulaOSC.exe File opened (read-only) \??\R: NebulaOSC.exe File opened (read-only) \??\T: NebulaOSC.exe File opened (read-only) \??\W: NebulaOSC.exe File opened (read-only) \??\X: NebulaOSC.exe File opened (read-only) \??\A: NebulaOSC.exe File opened (read-only) \??\B: NebulaOSC.exe File opened (read-only) \??\E: NebulaOSC.exe File opened (read-only) \??\J: NebulaOSC.exe File opened (read-only) \??\Q: NebulaOSC.exe File opened (read-only) \??\V: NebulaOSC.exe File opened (read-only) \??\I: NebulaOSC.exe File opened (read-only) \??\U: NebulaOSC.exe File opened (read-only) \??\Y: NebulaOSC.exe File opened (read-only) \??\G: NebulaOSC.exe File opened (read-only) \??\K: NebulaOSC.exe File opened (read-only) \??\L: NebulaOSC.exe File opened (read-only) \??\M: NebulaOSC.exe File opened (read-only) \??\S: NebulaOSC.exe File opened (read-only) \??\Z: NebulaOSC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2352 NebulaOSC.exe Token: 33 2352 NebulaOSC.exe Token: SeIncBasePriorityPrivilege 2352 NebulaOSC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2608 2352 NebulaOSC.exe 32 PID 2352 wrote to memory of 2608 2352 NebulaOSC.exe 32 PID 2352 wrote to memory of 2608 2352 NebulaOSC.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEBULA OSC\NebulaOSC.exe"C:\Users\Admin\AppData\Local\Temp\NEBULA OSC\NebulaOSC.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2352 -s 15642⤵PID:2608
-