Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
Resource
win10v2004-20231020-en
General
-
Target
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe
-
Size
65KB
-
MD5
29d2866e648339cd12813933914be0d7
-
SHA1
c5b93238bb6863325d74757997b7dd5fba039033
-
SHA256
361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
-
SHA512
b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8
-
SSDEEP
1536:gpgpHzb9dZVX9fHMvG0D3XJ84JIubONLaXf29o41ahfl:2gXdZt9P6D3XJ8Pu9XO9o4s/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4044 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4044 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 4044 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022e46-3.dat nsis_installer_1 behavioral2/files/0x0006000000022e46-3.dat nsis_installer_2 behavioral2/files/0x0006000000022e46-4.dat nsis_installer_1 behavioral2/files/0x0006000000022e46-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4044 1656 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 90 PID 1656 wrote to memory of 4044 1656 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 90 PID 1656 wrote to memory of 4044 1656 361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe"C:\Users\Admin\AppData\Local\Temp\361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:4044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
65KB
MD529d2866e648339cd12813933914be0d7
SHA1c5b93238bb6863325d74757997b7dd5fba039033
SHA256361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
SHA512b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8
-
Filesize
65KB
MD529d2866e648339cd12813933914be0d7
SHA1c5b93238bb6863325d74757997b7dd5fba039033
SHA256361be28aa0e631f929f1adc967fe9a6eb732a22417df20d8531138c01502b507
SHA512b8aa635f0a519f905466d195d3edd84fa817600e578020e0e1cd15c9f7ef1eb74f4477fbf307e3931814bc86860369d77e01ec6255c19529792a073483ac7dd8