Analysis
-
max time kernel
229s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
222d85c97cb9b0e77f9ba42b90ae52ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
222d85c97cb9b0e77f9ba42b90ae52ae.exe
Resource
win10v2004-20231215-en
General
-
Target
222d85c97cb9b0e77f9ba42b90ae52ae.exe
-
Size
304KB
-
MD5
222d85c97cb9b0e77f9ba42b90ae52ae
-
SHA1
7dc26d9af7f9739ca38bfd0317163fab09c578a2
-
SHA256
95533b4932cb1ab3b9b68fbaaa0881089b5a0fffe5b596900f7105b601ef85b7
-
SHA512
203694e99b7c4fc56c39aeb29bbfb780ce9accecf8766a7f0175247ab2c84950a026da6009fc8e42a63639ac2265865874af8c929dfef3052d7510479344b582
-
SSDEEP
6144:vQ3vo4ONnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2Js:GenM3D0Fw/tN8dkmLtpHHHrh7Gs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1324 222d85c97cb9b0e77f9ba42b90ae52ae.exe 2376 Au_.exe 2376 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x001000000000b1f5-2.dat nsis_installer_1 behavioral1/files/0x001000000000b1f5-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2376 1324 222d85c97cb9b0e77f9ba42b90ae52ae.exe 27 PID 1324 wrote to memory of 2376 1324 222d85c97cb9b0e77f9ba42b90ae52ae.exe 27 PID 1324 wrote to memory of 2376 1324 222d85c97cb9b0e77f9ba42b90ae52ae.exe 27 PID 1324 wrote to memory of 2376 1324 222d85c97cb9b0e77f9ba42b90ae52ae.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\222d85c97cb9b0e77f9ba42b90ae52ae.exe"C:\Users\Admin\AppData\Local\Temp\222d85c97cb9b0e77f9ba42b90ae52ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba
-
Filesize
304KB
MD5222d85c97cb9b0e77f9ba42b90ae52ae
SHA17dc26d9af7f9739ca38bfd0317163fab09c578a2
SHA25695533b4932cb1ab3b9b68fbaaa0881089b5a0fffe5b596900f7105b601ef85b7
SHA512203694e99b7c4fc56c39aeb29bbfb780ce9accecf8766a7f0175247ab2c84950a026da6009fc8e42a63639ac2265865874af8c929dfef3052d7510479344b582