Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
1857479a1de1529841f2654aab750011.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1857479a1de1529841f2654aab750011.exe
Resource
win10v2004-20231215-en
General
-
Target
1857479a1de1529841f2654aab750011.exe
-
Size
254KB
-
MD5
1857479a1de1529841f2654aab750011
-
SHA1
d84033daddec611bf8baceafb54dd05b452f3692
-
SHA256
21e5881992f89f790d2b1faa050d7fcbd770c91e38d67646c714bf974d908ee5
-
SHA512
e4e8f422a4e6e1bf864eb8a63790c396b6173bf88f1bfb89e1c4af3299e9208d5ab610731f3076f70d7fd95e15ff0fae75b5532be05d5fd75b46f542d978c251
-
SSDEEP
6144:JZ+11IdfMSYQNFcy/1RWBT55EqeXKMRwZm/G/HcGH:DdHYQ4s1s15bhop/G/8u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 888 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 888 Au_.exe 888 Au_.exe 888 Au_.exe 888 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002321a-4.dat nsis_installer_1 behavioral2/files/0x000700000002321a-4.dat nsis_installer_2 behavioral2/files/0x000700000002321a-3.dat nsis_installer_1 behavioral2/files/0x000700000002321a-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 888 1008 1857479a1de1529841f2654aab750011.exe 21 PID 1008 wrote to memory of 888 1008 1857479a1de1529841f2654aab750011.exe 21 PID 1008 wrote to memory of 888 1008 1857479a1de1529841f2654aab750011.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1857479a1de1529841f2654aab750011.exe"C:\Users\Admin\AppData\Local\Temp\1857479a1de1529841f2654aab750011.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
254KB
MD51857479a1de1529841f2654aab750011
SHA1d84033daddec611bf8baceafb54dd05b452f3692
SHA25621e5881992f89f790d2b1faa050d7fcbd770c91e38d67646c714bf974d908ee5
SHA512e4e8f422a4e6e1bf864eb8a63790c396b6173bf88f1bfb89e1c4af3299e9208d5ab610731f3076f70d7fd95e15ff0fae75b5532be05d5fd75b46f542d978c251
-
Filesize
92KB
MD5e48685d1fcb8af466e664546151cc14b
SHA172d15709afea2b0c7f88fe7cfa3197fb3ac6905f
SHA256f0f6e7345951d894516991334eaf460a2ecb127e2fc95385103a25a9594d79fc
SHA5120961ad4aaa3c5fe88a767a9be7cdc50160e3c8f6b336e222eed0ac51081eb9a95898f9bfcdc79ccaf601df12aba33701e075b3025be0d21098036ae3ff6f72ef