Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 21:52

General

  • Target

    759b4fca4e0f83ea18b5805237ef7eab.exe

  • Size

    152KB

  • MD5

    759b4fca4e0f83ea18b5805237ef7eab

  • SHA1

    c53c03a167771e68ec2aa5d4e9b1192fcc715fcc

  • SHA256

    166499205a2dbd87be3f4832628fbb86565fe6a7a05cd27eed3f67ee6c48ccdc

  • SHA512

    73bc2689a902d39534aae9abfe1ce073e32c00f0267344e6fef8d053ee389d3fb46d312cf8bdd3d288cc3f3337dcd3ebeae6a38d7220f22189aa79a910670ad5

  • SSDEEP

    3072:X8s1Gp7KusH9Cz7LNdzzxCnJ5MHfPRmLu9W9F3OeXLx/AYHu2:M3pZnf5hz4nJ65mLmWqebxoYh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\759b4fca4e0f83ea18b5805237ef7eab.exe
    "C:\Users\Admin\AppData\Local\Temp\759b4fca4e0f83ea18b5805237ef7eab.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\nsl55C3.tmp\norths.exe
      C:\Users\Admin\AppData\Local\Temp\nsl55C3.tmp\norths.exe /dT201303141140 /e5363385 /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:5620

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsl55C3.tmp\System.dll

          Filesize

          21KB

          MD5

          5ebc73650256e9c8ddbcda231db829a1

          SHA1

          988d4535e18754ab2a6248abae96c5697d7dbcd5

          SHA256

          1eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493

          SHA512

          b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270

        • C:\Users\Admin\AppData\Local\Temp\nsl55C3.tmp\VPatch.dll

          Filesize

          10KB

          MD5

          20ee82203544c4f831a7dc1650e7ec51

          SHA1

          671affb8e32f06777483782197173af254e02548

          SHA256

          69a00c14562ea5a71f6196b307292fa6d8b1a2fc02368020f40c84b3b0a1a83a

          SHA512

          4dabcc0cfebb36cfe57fa05777224f45c04c84031cfecf4184bd95d2b148ce18a6c91655320e69c1709e740a261e1e25effc8395fed91d0fc61b18f9a9f7685f

        • C:\Users\Admin\AppData\Local\Temp\nsl55C3.tmp\norths.exe

          Filesize

          261KB

          MD5

          aa00bd7622a1c4207dd474f7887f5f38

          SHA1

          23fdb3d65ba502c9987066d0c425ea6bd1d26523

          SHA256

          4513217d4e02ea5ff4521565b2a24f3a2521a6cfcd034f3f43af4fb4ad8ba73f

          SHA512

          c7cdefc4eb068c23bbe34ca5c43ef74afe8a31289201f4acf6864084543fe6ab75a5df5064bca620b45a50f945121406add4272b5aec157acaade1202f613ea6

        • memory/5620-22-0x0000000074B50000-0x0000000075101000-memory.dmp

          Filesize

          5.7MB

        • memory/5620-24-0x00000000011B0000-0x00000000011C0000-memory.dmp

          Filesize

          64KB

        • memory/5620-23-0x0000000074B50000-0x0000000075101000-memory.dmp

          Filesize

          5.7MB

        • memory/5620-38-0x00000000011B0000-0x00000000011C0000-memory.dmp

          Filesize

          64KB

        • memory/5620-37-0x00000000011B0000-0x00000000011C0000-memory.dmp

          Filesize

          64KB

        • memory/5620-40-0x0000000074B50000-0x0000000075101000-memory.dmp

          Filesize

          5.7MB