Analysis

  • max time kernel
    0s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 10:08

General

  • Target

    161a2a8a9f2c151f9c39536337481d19.exe

  • Size

    174KB

  • MD5

    161a2a8a9f2c151f9c39536337481d19

  • SHA1

    095468be7e5143a0bf3485d42a2de92ee0ef18f0

  • SHA256

    56e914fa4a931af91b4ae635a2929834eeb7dbd6d9ad4a5188b7f8c7bc2a2176

  • SHA512

    7f32bfc0605b9386d453ecc68585862052c2beec48842bf04d907c8a0cc7415a6fe51b2072b77d656f8b159973f22c3368e90f2cbad5b371c9aae5e77227eeef

  • SSDEEP

    3072:unOn7t7XpdpCCTg/sxFgJDKfuVCUCkIRzyXmcGpZuif5nifLGj9434GBFj0dzJ:uKpdcCrTquLhRO/CZfxEZNjj0H

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\161a2a8a9f2c151f9c39536337481d19.exe
    "C:\Users\Admin\AppData\Local\Temp\161a2a8a9f2c151f9c39536337481d19.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\nsq497E.tmp\northstar.exe
      C:\Users\Admin\AppData\Local\Temp\nsq497E.tmp\northstar.exe /u4e820da5-3514-4c8f-ba03-600d5bc06f2f /e2717787 /dT201212271617
      2⤵
      • Executes dropped EXE
      PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/628-13-0x0000000073F50000-0x0000000074501000-memory.dmp

    Filesize

    5.7MB

  • memory/628-15-0x00000000011E0000-0x00000000011F0000-memory.dmp

    Filesize

    64KB

  • memory/628-14-0x0000000073F50000-0x0000000074501000-memory.dmp

    Filesize

    5.7MB

  • memory/628-29-0x00000000011E0000-0x00000000011F0000-memory.dmp

    Filesize

    64KB

  • memory/628-28-0x00000000011E0000-0x00000000011F0000-memory.dmp

    Filesize

    64KB

  • memory/628-31-0x0000000073F50000-0x0000000074501000-memory.dmp

    Filesize

    5.7MB

  • memory/5068-35-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB