Analysis

  • max time kernel
    169s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 18:07

General

  • Target

    0a9b033acd106ba0507f91884ef93515.exe

  • Size

    406KB

  • MD5

    0a9b033acd106ba0507f91884ef93515

  • SHA1

    fc11c2a1ab2711f2b74afe1ea48b84ae487c75ba

  • SHA256

    05ef60df87c1f63c4290520a2d9cb27a4e004579ff0a2ca3e48c46db5ad1dcb2

  • SHA512

    dd72c17e602a9fd6604a545982350828533d9d824d5794add606159e9156d97b2d45d845b23022ea113249bed1a2663b6ea7e5fb51dcce343d0bd7cfcadf33b2

  • SSDEEP

    12288:MA0i50G7eAqDwV4Iu/cRQn5uFNUwbhG+bzv:MAfyGSAqg4IUcRyQNUwv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9b033acd106ba0507f91884ef93515.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9b033acd106ba0507f91884ef93515.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC csproduct Get UUID /FORMAT:textvaluelist.xsl
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2032
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC bios Get SerialNumber /FORMAT:textvaluelist.xsl
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4912
    • C:\Windows\SysWOW64\Wbem\WMIC.exe
      WMIC bios Get Version /FORMAT:textvaluelist.xsl
      2⤵
        PID:4452
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        WMIC csproduct Get Name /FORMAT:textvaluelist.xsl
        2⤵
          PID:1496
        • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\7za.exe
          7za.exe e -y -p"e255c46bdcbb0ec4750c9e35e39980d8" [RANDOM_STRING].7z
          2⤵
          • Executes dropped EXE
          PID:3176
        • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\setupcl.exe
          "C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\setupcl.exe" /initurl http://sub.nuidal.info/init/0a9b033acd106ba0507f91884ef93515/:uid:? /affid "-" /id "0" /name " " /uniqid 0a9b033acd106ba0507f91884ef93515 /uuid 00000000-0000-0000-0000-000000000000 /biosserial /biosversion ROCKS - 1 /csname Standard PC (Q35 + ICH9, 2009)
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3616
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic bios get serialnumber, version
            3⤵
              PID:1804
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 1188
              3⤵
              • Program crash
              PID:3068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3616 -ip 3616
          1⤵
            PID:1176

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\7za.exe

            Filesize

            460KB

            MD5

            ef1b30ba739ae86668c383a3c9a0065a

            SHA1

            02e5fd14e7961fc50aa9c96d5d4778d2d26fa429

            SHA256

            5c9cfb9a3674b9e91800016054788e315da62f8301a144142dae6cf8321b2d49

            SHA512

            37488304d1fe7d43fbce61f4d2a1c9896843034df737ee44a8cdd18cca3971606776a3f966838fe324df7ba9cad3a11f8ec65cf51525316dd5a3fdefe12865d1

          • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\7za.exe

            Filesize

            98KB

            MD5

            95fbd1c8615032eb21e03ea1cf863bf4

            SHA1

            a884635d8d1898d821ab467eb3004ba9c626bf0b

            SHA256

            57a21477297d04b1a2c05a6012b40dc241338a53942c385eeb5b4a4ed1362e5e

            SHA512

            9f8e2173ce60a995127b030433071e0cc596d1c2fb768d6a96fdd15824947c9476208bb432252d74a51e5a6bdc75ce903dfa02ff9679a2dfa24d263d489240bf

          • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\[RANDOM_STRING].7z

            Filesize

            80KB

            MD5

            7086fff49b1e644783274357b341b80e

            SHA1

            096cd074bd9075f83014cd1fe11d93f27dada4ef

            SHA256

            93ba3306a4cb1ecac3a1efef43481366ca3b09ffba8d79ce3b324b56b7cdab7f

            SHA512

            756072c2c50b1ad222278b7eb97563518dd6019ce2dfc1c325ee74250c8b3436945ad6a439cdcc5129ff2523d712e9c7290b7d4a3132b97f7f55a7d8d1560750

          • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\nsExec.dll

            Filesize

            8KB

            MD5

            b8be6632a7dc8136ff01338be40fe701

            SHA1

            043fa16929b2af5ed5c1c59b4035a10cf765fb43

            SHA256

            289786fe13801467653eb2712f47f162d6fd3fc2d844be342282f75fc2b2a085

            SHA512

            403474154ff8500e5aae2b4466c652e5d066af2c55d8f158e6f007492ceb1f3abcc6cca80842b90900db02db4258ddcda75dec1d1799af24969c35811891e5b8

          • C:\Users\Admin\AppData\Local\Temp\nsaF908.tmp\setupcl.exe

            Filesize

            193KB

            MD5

            bbb978e54532b56c704f61fb335613bd

            SHA1

            2f8442e51b50eced927cdf4b04df69f66475a3ca

            SHA256

            99bc8c522304d2bce8b33ba999be219b43b799cafddc953b24cb9af771b4f15c

            SHA512

            366d2e0cf28d9d23246b5bde811e3acb4f019e23dfe55d9977483ae711ca98294b521ac8d86c24000df6d0e787df75523b069a02ce17fff9224911557503a58a

          • memory/3616-37-0x00000000004E0000-0x00000000004E1000-memory.dmp

            Filesize

            4KB

          • memory/3616-38-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/3616-39-0x00000000004E0000-0x00000000004E1000-memory.dmp

            Filesize

            4KB

          • memory/3616-40-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/3616-41-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/4852-29-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/4852-36-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB