Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2023 18:56

General

  • Target

    361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe

  • Size

    65KB

  • MD5

    29d2866e648339cd12813933914be0d7

  • SHA1

    c5b93238bb6863325d74757997b7dd5fba039033

  • SHA256

    361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507

  • SHA512

    b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8

  • SSDEEP

    1536:gpgpHzb9dZVX9fHMvG0D3XJ84JIubONLaXf29o41ahfl:2gXdZt9P6D3XJ8Pu9XO9o4s/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
    "C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsd7679.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    65KB

    MD5

    29d2866e648339cd12813933914be0d7

    SHA1

    c5b93238bb6863325d74757997b7dd5fba039033

    SHA256

    361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507

    SHA512

    b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    65KB

    MD5

    29d2866e648339cd12813933914be0d7

    SHA1

    c5b93238bb6863325d74757997b7dd5fba039033

    SHA256

    361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507

    SHA512

    b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8

  • \Users\Admin\AppData\Local\Temp\nsd7679.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    65KB

    MD5

    29d2866e648339cd12813933914be0d7

    SHA1

    c5b93238bb6863325d74757997b7dd5fba039033

    SHA256

    361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507

    SHA512

    b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8