Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe
Resource
win10v2004-20231023-en
General
-
Target
0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe
-
Size
3.0MB
-
MD5
3fd92fb1598e59931f66fd408797f799
-
SHA1
22d4b3329f66c9120aa44336fee02b597fd090f2
-
SHA256
0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d
-
SHA512
aed8588e25795c2cff3cf6066a479403d4b26b63d57993ecf8a1a8e300b9644d721daf677456f093aee5a21837f33cd68d7f5fb5bb99bb6ea890ec7e7d953002
-
SSDEEP
49152:r4z9MjQL6DW21yxAfovAF6RKcDx+29uWV9D489id:kZMY6DW21+AAvAF6RKI91PM+O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 NSUDOLC.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 cmd.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2856 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 NSUDOLC.exe 2760 NSUDOLC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 2760 NSUDOLC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2416 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe 28 PID 2128 wrote to memory of 2416 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe 28 PID 2128 wrote to memory of 2416 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe 28 PID 2128 wrote to memory of 2416 2128 0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe 28 PID 2416 wrote to memory of 2856 2416 cmd.exe 30 PID 2416 wrote to memory of 2856 2416 cmd.exe 30 PID 2416 wrote to memory of 2856 2416 cmd.exe 30 PID 2416 wrote to memory of 2856 2416 cmd.exe 30 PID 2416 wrote to memory of 2760 2416 cmd.exe 32 PID 2416 wrote to memory of 2760 2416 cmd.exe 32 PID 2416 wrote to memory of 2760 2416 cmd.exe 32 PID 2416 wrote to memory of 2760 2416 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe"C:\Users\Admin\AppData\Local\Temp\0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /PID 21283⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\NSUDOLC.exeNSUDOLC /U:S /P:E C:\Users\Admin\AppData\Local\Temp\0894f838e2ff9f2dd7b58fc9116af789f9aa270a22cf8082e5bc9fa50e26720d.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910
-
Filesize
145B
MD55bd62389a33db1ea16976f3bfb5722d0
SHA1db920eb5518a0ba47d1c0a52ab1732647780b63c
SHA256261a73baedf4ce8d9337c4c523f8965df4fc11ae56f683ef3535c1acdc4addf9
SHA512d02210817ca0fc791ce106202223339b3f28421dc6d595e33f567419d98501443a4929b94a64df59e69d54314c35a25ebf0ac6bbf0941159ba8e4130305aac2c
-
Filesize
145B
MD55bd62389a33db1ea16976f3bfb5722d0
SHA1db920eb5518a0ba47d1c0a52ab1732647780b63c
SHA256261a73baedf4ce8d9337c4c523f8965df4fc11ae56f683ef3535c1acdc4addf9
SHA512d02210817ca0fc791ce106202223339b3f28421dc6d595e33f567419d98501443a4929b94a64df59e69d54314c35a25ebf0ac6bbf0941159ba8e4130305aac2c
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910