Overview
overview
4Static
static
3971a8c3727...dd.exe
windows7-x64
4971a8c3727...dd.exe
windows10-2004-x64
4$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240221-en
General
-
Target
971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe
-
Size
462KB
-
MD5
9ea32737502875553a2d7e91f152047c
-
SHA1
fde712ea966265459adcaddf00e29211e0db10b7
-
SHA256
971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd
-
SHA512
a7941fa29e77cd39b22e77477fa5ad22f768e101cd8c0e169655dd87c87c021140791ef57d32e6dcdfad82881d719393ab613ab7e015a077f49da3eee1a75c2d
-
SSDEEP
6144:RqjIxCJHdERcKqvjGfSyyAvTEs9ItH8xWJ40Y9Vlvv4vvvvvlvvvvvyvvvvVklOq:4w8dN1ryvNItH8xa4HcQGzml/2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1128 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 1128 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023210-3.dat nsis_installer_1 behavioral2/files/0x000b000000023210-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1128 5024 971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe 91 PID 5024 wrote to memory of 1128 5024 971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe 91 PID 5024 wrote to memory of 1128 5024 971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe"C:\Users\Admin\AppData\Local\Temp\971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51c8b2b40c642e8b5a5b3ff102796fb37
SHA13245f55afac50f775eb53fd6d14abb7fe523393d
SHA2568780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c
SHA5124ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57
-
Filesize
462KB
MD59ea32737502875553a2d7e91f152047c
SHA1fde712ea966265459adcaddf00e29211e0db10b7
SHA256971a8c37276454ff1dcf406a04cb0a2bbae62f2489ecad6d64a57127cbcab3dd
SHA512a7941fa29e77cd39b22e77477fa5ad22f768e101cd8c0e169655dd87c87c021140791ef57d32e6dcdfad82881d719393ab613ab7e015a077f49da3eee1a75c2d