Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
4b227fb75474ef3a0749e244c9ea641b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b227fb75474ef3a0749e244c9ea641b.exe
Resource
win10v2004-20231215-en
General
-
Target
4b227fb75474ef3a0749e244c9ea641b.exe
-
Size
305KB
-
MD5
4b227fb75474ef3a0749e244c9ea641b
-
SHA1
2b540bc3f3425e0590462ec26e9bde8eb49d7ec2
-
SHA256
165a0dc5f795bd08be53a7ddc9a0c34968a5b1c24136853bd6a4a4b6c50f3b02
-
SHA512
a0956f2e09ce0694e965ef39398f1890daf20362861059dd8177cec25446956b368270b1f4e5566248b72df469cdf2bb4e141b3c5dfa0a8e5e78c7c1a6e698a6
-
SSDEEP
6144:ZQ3lRfUnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2gG:WRfUnM3D0Fw/tN8dkmLtpHHHrh7a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1940 4b227fb75474ef3a0749e244c9ea641b.exe 2612 Au_.exe 2612 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000900000001225c-2.dat nsis_installer_1 behavioral1/files/0x000900000001225c-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2612 1940 4b227fb75474ef3a0749e244c9ea641b.exe 28 PID 1940 wrote to memory of 2612 1940 4b227fb75474ef3a0749e244c9ea641b.exe 28 PID 1940 wrote to memory of 2612 1940 4b227fb75474ef3a0749e244c9ea641b.exe 28 PID 1940 wrote to memory of 2612 1940 4b227fb75474ef3a0749e244c9ea641b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b227fb75474ef3a0749e244c9ea641b.exe"C:\Users\Admin\AppData\Local\Temp\4b227fb75474ef3a0749e244c9ea641b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba
-
Filesize
305KB
MD54b227fb75474ef3a0749e244c9ea641b
SHA12b540bc3f3425e0590462ec26e9bde8eb49d7ec2
SHA256165a0dc5f795bd08be53a7ddc9a0c34968a5b1c24136853bd6a4a4b6c50f3b02
SHA512a0956f2e09ce0694e965ef39398f1890daf20362861059dd8177cec25446956b368270b1f4e5566248b72df469cdf2bb4e141b3c5dfa0a8e5e78c7c1a6e698a6