Analysis
-
max time kernel
0s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 10:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
161a2a8a9f2c151f9c39536337481d19.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
161a2a8a9f2c151f9c39536337481d19.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
161a2a8a9f2c151f9c39536337481d19.exe
-
Size
174KB
-
MD5
161a2a8a9f2c151f9c39536337481d19
-
SHA1
095468be7e5143a0bf3485d42a2de92ee0ef18f0
-
SHA256
56e914fa4a931af91b4ae635a2929834eeb7dbd6d9ad4a5188b7f8c7bc2a2176
-
SHA512
7f32bfc0605b9386d453ecc68585862052c2beec48842bf04d907c8a0cc7415a6fe51b2072b77d656f8b159973f22c3368e90f2cbad5b371c9aae5e77227eeef
-
SSDEEP
3072:unOn7t7XpdpCCTg/sxFgJDKfuVCUCkIRzyXmcGpZuif5nifLGj9434GBFj0dzJ:uKpdcCrTquLhRO/CZfxEZNjj0H
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 628 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 5068 161a2a8a9f2c151f9c39536337481d19.exe 5068 161a2a8a9f2c151f9c39536337481d19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 628 5068 161a2a8a9f2c151f9c39536337481d19.exe 20 PID 5068 wrote to memory of 628 5068 161a2a8a9f2c151f9c39536337481d19.exe 20 PID 5068 wrote to memory of 628 5068 161a2a8a9f2c151f9c39536337481d19.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\161a2a8a9f2c151f9c39536337481d19.exe"C:\Users\Admin\AppData\Local\Temp\161a2a8a9f2c151f9c39536337481d19.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\nsq497E.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsq497E.tmp\northstar.exe /u4e820da5-3514-4c8f-ba03-600d5bc06f2f /e2717787 /dT2012122716172⤵
- Executes dropped EXE
PID:628
-