Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:00
Static task
static1
Behavioral task
behavioral1
Sample
6cc534e745d70574889a5483ceddea3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6cc534e745d70574889a5483ceddea3e.exe
Resource
win10v2004-20231222-en
General
-
Target
6cc534e745d70574889a5483ceddea3e.exe
-
Size
174KB
-
MD5
6cc534e745d70574889a5483ceddea3e
-
SHA1
36cd00ce2b09db6c185b5169232c6c7972d7df8a
-
SHA256
13fa44b041b729c752a0c83530a4f70f70aaa60e2fa994c7f8a6334f84db8ed0
-
SHA512
55a0cd0e925a00f1b1990dbfc41850bf5d44947100699cb90fcbbb7faa55e4dec80fd9ddcea826aaf2dddc2608ef0c416cc530f17bb608feeeb14564eb41c9a0
-
SSDEEP
3072:9nOn7t7XpdpCCTg/sxFgJDDTaCHjbazYaB1G+9uR5q1a8IxCPFElk/7:9KpdcCrTqTHv6G+IRFgPFmkD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3872 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 1532 6cc534e745d70574889a5483ceddea3e.exe 1532 6cc534e745d70574889a5483ceddea3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3872 1532 6cc534e745d70574889a5483ceddea3e.exe 20 PID 1532 wrote to memory of 3872 1532 6cc534e745d70574889a5483ceddea3e.exe 20 PID 1532 wrote to memory of 3872 1532 6cc534e745d70574889a5483ceddea3e.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc534e745d70574889a5483ceddea3e.exe"C:\Users\Admin\AppData\Local\Temp\6cc534e745d70574889a5483ceddea3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\nsl3B75.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsl3B75.tmp\northstar.exe /u4fbfca05-374c-42b7-8d55-26865bc06f2f /e5333931 /dT2013012110532⤵
- Executes dropped EXE
PID:3872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270
-
Filesize
92KB
MD54559992687241648c1cced8a2ed746ee
SHA1e337126af9478a81bc12f0ccf80d698701a89d96
SHA256ff4d0719c4399af46f6b47484a34dfce6aa70c944a46bd9a071fa4edecc46985
SHA5124ac22eb2f4786f0a1cff7ada6916fc7633dfb9dcd1c0a82beb80353d7372d2d38b85e19d2b2917a318bf3d1c5fe53c93a11ef037227c73c86a0034a560be85b2