Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
05fbbfb865557ff3a0b8b980c1f6b216.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05fbbfb865557ff3a0b8b980c1f6b216.exe
Resource
win10v2004-20231215-en
General
-
Target
05fbbfb865557ff3a0b8b980c1f6b216.exe
-
Size
79KB
-
MD5
05fbbfb865557ff3a0b8b980c1f6b216
-
SHA1
ec4bb9cb596b5363c7752725903d79ec323fe932
-
SHA256
e26b6c0ec9f054c9a709fd372b16a52b9d133f4439f00ac2f18fa58874cd0047
-
SHA512
d3b596b0e611e54d17b5688cc56df9b12575703bde5c487bff48f6964ddd0a70a5bcdf3765dbf2d31f6a99de6613a76b598806af20701bbd8e52dd670818784a
-
SSDEEP
1536:fpgpHzb9dZVX9fHMvG0D3XJogdLeAyNahkMMIeswxZiTKd1drj6CSWmM:BgXdZt9P6D3XJoceA3pLeWuxj6JTM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1264 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1264 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 284 05fbbfb865557ff3a0b8b980c1f6b216.exe 1264 Au_.exe 1264 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000f000000015c2f-2.dat nsis_installer_1 behavioral1/files/0x000f000000015c2f-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 284 wrote to memory of 1264 284 05fbbfb865557ff3a0b8b980c1f6b216.exe 28 PID 284 wrote to memory of 1264 284 05fbbfb865557ff3a0b8b980c1f6b216.exe 28 PID 284 wrote to memory of 1264 284 05fbbfb865557ff3a0b8b980c1f6b216.exe 28 PID 284 wrote to memory of 1264 284 05fbbfb865557ff3a0b8b980c1f6b216.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05fbbfb865557ff3a0b8b980c1f6b216.exe"C:\Users\Admin\AppData\Local\Temp\05fbbfb865557ff3a0b8b980c1f6b216.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD53599d30554ad65dc29fc689217d2152e
SHA18f5fcc313b667a1de2d56573bcf98d43fd0d4ff9
SHA2561af3ac7d3176af42e8594ba0c33821d3318f4eea5cbb799bf8fab58e480efe0e
SHA512846776b1d908b5204667715ffdfd3a6c76dface1677e8b1e5156ceac2ef0a739f68b48ccbb919c9e08d6ff359a93174bf0b90def7d48cee54cd3c41d8d8575f2
-
Filesize
21KB
MD5d90021fa6e58e4006f0bc892238e894e
SHA15377e83ac32e0e13190a26f0020a5fa50ea78c8c
SHA256e20683095e7e8580955e11632293d52d609e802b899099d3ee246d1a4828f2b1
SHA512696a442e62cfeee863f50bffc9c8c890458fdac92f6d92f465f895cd4d0fa58607db4dacf518251b83824c3d795482d47d76c877b84f1af3129bbf9526e9f347
-
Filesize
79KB
MD505fbbfb865557ff3a0b8b980c1f6b216
SHA1ec4bb9cb596b5363c7752725903d79ec323fe932
SHA256e26b6c0ec9f054c9a709fd372b16a52b9d133f4439f00ac2f18fa58874cd0047
SHA512d3b596b0e611e54d17b5688cc56df9b12575703bde5c487bff48f6964ddd0a70a5bcdf3765dbf2d31f6a99de6613a76b598806af20701bbd8e52dd670818784a