Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
302e5c4fa5ad21b120610c815cbf46e5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
302e5c4fa5ad21b120610c815cbf46e5.exe
Resource
win10v2004-20231215-en
General
-
Target
302e5c4fa5ad21b120610c815cbf46e5.exe
-
Size
174KB
-
MD5
302e5c4fa5ad21b120610c815cbf46e5
-
SHA1
db9803c8c7bf04cdc4a6c9c234bd9886884d6b50
-
SHA256
34ca20e2f1cb1c89027cfbe71f1393574277a78cc1b5ce2f836935a713d27142
-
SHA512
519c11ed6113d3f194466188583931cb8883103d834d5167c602e72405fe84744e0dcd29924d4fa2da3b8f4c2fd70c102229dfdf2ef25ab4389a884408fd0d43
-
SSDEEP
3072:FnOn7t7XpdpCCTg/sxFgJDUsCI/7EIc2oqehv7SlkiFCx0fEEPmd/LV7:FKpdcCrTqq2vcFVSkKwZEPmpV7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5044 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 4816 302e5c4fa5ad21b120610c815cbf46e5.exe 4816 302e5c4fa5ad21b120610c815cbf46e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 5044 4816 302e5c4fa5ad21b120610c815cbf46e5.exe 20 PID 4816 wrote to memory of 5044 4816 302e5c4fa5ad21b120610c815cbf46e5.exe 20 PID 4816 wrote to memory of 5044 4816 302e5c4fa5ad21b120610c815cbf46e5.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\302e5c4fa5ad21b120610c815cbf46e5.exe"C:\Users\Admin\AppData\Local\Temp\302e5c4fa5ad21b120610c815cbf46e5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\nsf4807.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsf4807.tmp\northstar.exe /u4d48824f-345c-4a9b-9d9f-793b5bc06ebe /e2504423 /dT2013012114222⤵
- Executes dropped EXE
PID:5044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270
-
Filesize
92KB
MD54559992687241648c1cced8a2ed746ee
SHA1e337126af9478a81bc12f0ccf80d698701a89d96
SHA256ff4d0719c4399af46f6b47484a34dfce6aa70c944a46bd9a071fa4edecc46985
SHA5124ac22eb2f4786f0a1cff7ada6916fc7633dfb9dcd1c0a82beb80353d7372d2d38b85e19d2b2917a318bf3d1c5fe53c93a11ef037227c73c86a0034a560be85b2