Analysis

  • max time kernel
    138s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 14:30

General

  • Target

    NEBULA OSC/NebulaOSC.exe

  • Size

    1.5MB

  • MD5

    d3afb4ad345f7dd766cf48f6c225b6c0

  • SHA1

    81770566a842c3ef4ff306f2f9dbfde44e84d9eb

  • SHA256

    fdd2f4e79f4970ca1bbdf4215e72483e43d4cc0f08e3932640c767c04fd41639

  • SHA512

    621dafd13d2828d299b33790ad51bc315bb51c11187661605267dfe8355e7247848362c443bed47d7dc5ff9487fda8bed0186820c46cb67bfb526e3b147d703c

  • SSDEEP

    49152:N/4M779Rck9tV5w1ZvLl7XrOOliyea7m:NdDUvLl7XrO/xAm

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEBULA OSC\NebulaOSC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEBULA OSC\NebulaOSC.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    PID:3340
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x244 0x4f0
    1⤵
      PID:216

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • memory/3340-0-0x000001F6E11D0000-0x000001F6E135A000-memory.dmp

            Filesize

            1.5MB

          • memory/3340-1-0x00007FFF68EA0000-0x00007FFF69961000-memory.dmp

            Filesize

            10.8MB

          • memory/3340-2-0x000001F6E1700000-0x000001F6E1701000-memory.dmp

            Filesize

            4KB

          • memory/3340-3-0x000001F6FB810000-0x000001F6FB820000-memory.dmp

            Filesize

            64KB

          • memory/3340-4-0x000001F6E2F60000-0x000001F6E2F7C000-memory.dmp

            Filesize

            112KB

          • memory/3340-5-0x000001F6FBA20000-0x000001F6FBA78000-memory.dmp

            Filesize

            352KB

          • memory/3340-6-0x000001F6FBC50000-0x000001F6FC754000-memory.dmp

            Filesize

            11.0MB

          • memory/3340-17-0x00007FFF68EA0000-0x00007FFF69961000-memory.dmp

            Filesize

            10.8MB

          • memory/3340-18-0x000001F6FB810000-0x000001F6FB820000-memory.dmp

            Filesize

            64KB

          • memory/3340-19-0x000001F6FBC50000-0x000001F6FC754000-memory.dmp

            Filesize

            11.0MB

          • memory/3340-23-0x00007FFF68EA0000-0x00007FFF69961000-memory.dmp

            Filesize

            10.8MB