Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe
Resource
win10v2004-20230915-en
General
-
Target
e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe
-
Size
788KB
-
MD5
01ca9dece9f4cd45baaefef5ef87a624
-
SHA1
5d1ca5b9fb75b62cca1918e624a90130cdc6a4bf
-
SHA256
e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948
-
SHA512
5d4fab7df04d4988287395cef58ebdad88f809002e89aa410956dadf70c1b4f516b2895b28e29606260e21e502964df69be63d8fea16ab0430b5b5721cc80592
-
SSDEEP
12288:cDm7P4emd2sa2fPPe0Bushlv9PYJAtuiad:c+PVjsbfPmwu2lFPYJAtuiad
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 NSUDOLC.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2464 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 NSUDOLC.exe 2644 NSUDOLC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2464 taskkill.exe Token: SeDebugPrivilege 2644 NSUDOLC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3000 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe 28 PID 2988 wrote to memory of 3000 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe 28 PID 2988 wrote to memory of 3000 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe 28 PID 2988 wrote to memory of 3000 2988 e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe 28 PID 3000 wrote to memory of 2464 3000 cmd.exe 30 PID 3000 wrote to memory of 2464 3000 cmd.exe 30 PID 3000 wrote to memory of 2464 3000 cmd.exe 30 PID 3000 wrote to memory of 2464 3000 cmd.exe 30 PID 3000 wrote to memory of 2644 3000 cmd.exe 32 PID 3000 wrote to memory of 2644 3000 cmd.exe 32 PID 3000 wrote to memory of 2644 3000 cmd.exe 32 PID 3000 wrote to memory of 2644 3000 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe"C:\Users\Admin\AppData\Local\Temp\e582b937e4e282be841e2b0ba172f624db5f6afacd8e21990e43bfe8d3434948.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /PID 29883⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\NSUDOLC.exeNSUDOLC /U:S /P:E C:\Users\Admin\AppData\Local\Temp\LastAvenger.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910
-
Filesize
92B
MD566cf74559d822a2698f38709c3b93128
SHA15d05ad9923cd46014afe9d93289b35f011aa8dcc
SHA256f8503370e276faa47b06e7e5648e111e8ae315d0731ba2326ac46ea9b7eda803
SHA512183e3c22a624530e13a5c0600a7c5c6392aed4d111372a5a17ae9af73aff5e01211accf4ba264a8b68e5c756271353519e6fd76354ca061fd17a8825077cab2d
-
Filesize
92B
MD566cf74559d822a2698f38709c3b93128
SHA15d05ad9923cd46014afe9d93289b35f011aa8dcc
SHA256f8503370e276faa47b06e7e5648e111e8ae315d0731ba2326ac46ea9b7eda803
SHA512183e3c22a624530e13a5c0600a7c5c6392aed4d111372a5a17ae9af73aff5e01211accf4ba264a8b68e5c756271353519e6fd76354ca061fd17a8825077cab2d
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910