Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:44

General

  • Target

    05fbbfb865557ff3a0b8b980c1f6b216.exe

  • Size

    79KB

  • MD5

    05fbbfb865557ff3a0b8b980c1f6b216

  • SHA1

    ec4bb9cb596b5363c7752725903d79ec323fe932

  • SHA256

    e26b6c0ec9f054c9a709fd372b16a52b9d133f4439f00ac2f18fa58874cd0047

  • SHA512

    d3b596b0e611e54d17b5688cc56df9b12575703bde5c487bff48f6964ddd0a70a5bcdf3765dbf2d31f6a99de6613a76b598806af20701bbd8e52dd670818784a

  • SSDEEP

    1536:fpgpHzb9dZVX9fHMvG0D3XJogdLeAyNahkMMIeswxZiTKd1drj6CSWmM:BgXdZt9P6D3XJoceA3pLeWuxj6JTM

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05fbbfb865557ff3a0b8b980c1f6b216.exe
    "C:\Users\Admin\AppData\Local\Temp\05fbbfb865557ff3a0b8b980c1f6b216.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:284
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy824B.tmp\KillProcDLL.dll

    Filesize

    44KB

    MD5

    3599d30554ad65dc29fc689217d2152e

    SHA1

    8f5fcc313b667a1de2d56573bcf98d43fd0d4ff9

    SHA256

    1af3ac7d3176af42e8594ba0c33821d3318f4eea5cbb799bf8fab58e480efe0e

    SHA512

    846776b1d908b5204667715ffdfd3a6c76dface1677e8b1e5156ceac2ef0a739f68b48ccbb919c9e08d6ff359a93174bf0b90def7d48cee54cd3c41d8d8575f2

  • \Users\Admin\AppData\Local\Temp\nsy824B.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d90021fa6e58e4006f0bc892238e894e

    SHA1

    5377e83ac32e0e13190a26f0020a5fa50ea78c8c

    SHA256

    e20683095e7e8580955e11632293d52d609e802b899099d3ee246d1a4828f2b1

    SHA512

    696a442e62cfeee863f50bffc9c8c890458fdac92f6d92f465f895cd4d0fa58607db4dacf518251b83824c3d795482d47d76c877b84f1af3129bbf9526e9f347

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    79KB

    MD5

    05fbbfb865557ff3a0b8b980c1f6b216

    SHA1

    ec4bb9cb596b5363c7752725903d79ec323fe932

    SHA256

    e26b6c0ec9f054c9a709fd372b16a52b9d133f4439f00ac2f18fa58874cd0047

    SHA512

    d3b596b0e611e54d17b5688cc56df9b12575703bde5c487bff48f6964ddd0a70a5bcdf3765dbf2d31f6a99de6613a76b598806af20701bbd8e52dd670818784a