Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:17

General

  • Target

    212633c3996c92d9cfd4f2d3c9209669.exe

  • Size

    174KB

  • MD5

    212633c3996c92d9cfd4f2d3c9209669

  • SHA1

    c5ec151af81d0f388887a71e04e8122be996b2af

  • SHA256

    06ca6e24d454b4a2c3053965e020de9085c9975c8242affa19f364d6fc7ccf8c

  • SHA512

    dc9fe33679652f7e7d8ea118d2f32f2ece8d8e3df1d5f22877cd0bb29ab9b10e417a539e76ae7292e6c412396aefa292255700ef134ad1b57798c0d936f906f8

  • SSDEEP

    3072:VnOn7t7XpdpCCTg/sxFgJDkICQio478Q7+TBmoTbdFeXx5t3qpVRxTgEtbc:VKpdcCrTq+1xH7+TBpbdId3qp3xsEtbc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\212633c3996c92d9cfd4f2d3c9209669.exe
    "C:\Users\Admin\AppData\Local\Temp\212633c3996c92d9cfd4f2d3c9209669.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\nsn422B.tmp\northstar.exe
      C:\Users\Admin\AppData\Local\Temp\nsn422B.tmp\northstar.exe /u4d886865-fe6c-4569-82be-0f545bc06ebe /e2262827 /dT201301220149
      2⤵
      • Executes dropped EXE
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-14-0x0000000000BA0000-0x0000000000BB0000-memory.dmp

    Filesize

    64KB

  • memory/2040-15-0x0000000074760000-0x0000000074D11000-memory.dmp

    Filesize

    5.7MB

  • memory/2040-13-0x0000000074760000-0x0000000074D11000-memory.dmp

    Filesize

    5.7MB

  • memory/2040-27-0x0000000000BA0000-0x0000000000BB0000-memory.dmp

    Filesize

    64KB

  • memory/2040-26-0x0000000000BA0000-0x0000000000BB0000-memory.dmp

    Filesize

    64KB

  • memory/2040-28-0x0000000000BA0000-0x0000000000BB0000-memory.dmp

    Filesize

    64KB

  • memory/2040-30-0x0000000074760000-0x0000000074D11000-memory.dmp

    Filesize

    5.7MB

  • memory/3040-34-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB