Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
212633c3996c92d9cfd4f2d3c9209669.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
212633c3996c92d9cfd4f2d3c9209669.exe
Resource
win10v2004-20231215-en
General
-
Target
212633c3996c92d9cfd4f2d3c9209669.exe
-
Size
174KB
-
MD5
212633c3996c92d9cfd4f2d3c9209669
-
SHA1
c5ec151af81d0f388887a71e04e8122be996b2af
-
SHA256
06ca6e24d454b4a2c3053965e020de9085c9975c8242affa19f364d6fc7ccf8c
-
SHA512
dc9fe33679652f7e7d8ea118d2f32f2ece8d8e3df1d5f22877cd0bb29ab9b10e417a539e76ae7292e6c412396aefa292255700ef134ad1b57798c0d936f906f8
-
SSDEEP
3072:VnOn7t7XpdpCCTg/sxFgJDkICQio478Q7+TBmoTbdFeXx5t3qpVRxTgEtbc:VKpdcCrTq+1xH7+TBpbdId3qp3xsEtbc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 212633c3996c92d9cfd4f2d3c9209669.exe 3040 212633c3996c92d9cfd4f2d3c9209669.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2040 3040 212633c3996c92d9cfd4f2d3c9209669.exe 19 PID 3040 wrote to memory of 2040 3040 212633c3996c92d9cfd4f2d3c9209669.exe 19 PID 3040 wrote to memory of 2040 3040 212633c3996c92d9cfd4f2d3c9209669.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\212633c3996c92d9cfd4f2d3c9209669.exe"C:\Users\Admin\AppData\Local\Temp\212633c3996c92d9cfd4f2d3c9209669.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\nsn422B.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsn422B.tmp\northstar.exe /u4d886865-fe6c-4569-82be-0f545bc06ebe /e2262827 /dT2013012201492⤵
- Executes dropped EXE
PID:2040
-