Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
Resource
win10v2004-20231020-en
General
-
Target
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
-
Size
65KB
-
MD5
29d2866e648339cd12813933914be0d7
-
SHA1
c5b93238bb6863325d74757997b7dd5fba039033
-
SHA256
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
-
SHA512
b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8
-
SSDEEP
1536:gpgpHzb9dZVX9fHMvG0D3XJ84JIubONLaXf29o41ahfl:2gXdZt9P6D3XJ8Pu9XO9o4s/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 1704 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x000c0000000122d9-2.dat nsis_installer_1 behavioral1/files/0x000c0000000122d9-2.dat nsis_installer_2 behavioral1/files/0x000c0000000122d9-5.dat nsis_installer_1 behavioral1/files/0x000c0000000122d9-5.dat nsis_installer_2 behavioral1/files/0x000c0000000122d9-6.dat nsis_installer_1 behavioral1/files/0x000c0000000122d9-6.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1704 2780 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 28 PID 2780 wrote to memory of 1704 2780 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 28 PID 2780 wrote to memory of 1704 2780 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 28 PID 2780 wrote to memory of 1704 2780 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe"C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
65KB
MD529d2866e648339cd12813933914be0d7
SHA1c5b93238bb6863325d74757997b7dd5fba039033
SHA256361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
SHA512b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8
-
Filesize
65KB
MD529d2866e648339cd12813933914be0d7
SHA1c5b93238bb6863325d74757997b7dd5fba039033
SHA256361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
SHA512b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
65KB
MD529d2866e648339cd12813933914be0d7
SHA1c5b93238bb6863325d74757997b7dd5fba039033
SHA256361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
SHA512b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8