Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 20:03
Behavioral task
behavioral1
Sample
acbb23363c96f5bf2a67009cb5c7f7bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acbb23363c96f5bf2a67009cb5c7f7bb.exe
Resource
win10v2004-20240226-en
General
-
Target
acbb23363c96f5bf2a67009cb5c7f7bb.exe
-
Size
233KB
-
MD5
acbb23363c96f5bf2a67009cb5c7f7bb
-
SHA1
9e6434ae8cfa29860b24e93bab6903d792152496
-
SHA256
bbd68336cf1a09f3f81881e94777735c89b8d76bef6244cbd60699e8b4287b68
-
SHA512
0b8ccb419375e0d9e84030e13dd8b5b1158986b25281502a79d01df556911f475a0a17ae592ba44f1e221ffcea3cb9dc97fb1169653b0cbfd2a7de651c502f81
-
SSDEEP
6144:ASe8ZIdHXmwqih5zsp58YcncKdivrxnLyfC+KdUgO:+814ep5z0C1LyfC+W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 NAS.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe -
resource yara_rule behavioral1/memory/1224-0-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/1224-2-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/files/0x0007000000015c87-4.dat upx behavioral1/memory/2396-13-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/1224-14-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/2396-18-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/2396-20-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/2396-21-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/2396-24-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/1224-32-0x0000000000400000-0x00000000004A3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NAS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NAS.exe" NAS.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2396 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 31 PID 1224 wrote to memory of 2396 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 31 PID 1224 wrote to memory of 2396 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 31 PID 1224 wrote to memory of 2396 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 31 PID 1224 wrote to memory of 2280 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 37 PID 1224 wrote to memory of 2280 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 37 PID 1224 wrote to memory of 2280 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 37 PID 1224 wrote to memory of 2280 1224 acbb23363c96f5bf2a67009cb5c7f7bb.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\acbb23363c96f5bf2a67009cb5c7f7bb.exe"C:\Users\Admin\AppData\Local\Temp\acbb23363c96f5bf2a67009cb5c7f7bb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\NAS.exeC:\Users\Admin\AppData\Local\Temp\NAS.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\deleteself.bat2⤵
- Deletes itself
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD589155bddece822383d4b244bc155eff5
SHA1f852080fa272c2862cf4ac7b3730fb46baa84e60
SHA2561f5fb5c4abddfcb5227d120bcf272ab0d6a08941faff10b42caefc951b03b46c
SHA5121189972dd4ba4b6e544b0185a071018fbdc563f5ef295ce2dff89e8a01c34ce0b1eca53513ffddcf7e5f692a88a1e00b41e93acaba318c80f9f65467b339c53e
-
Filesize
233KB
MD5acbb23363c96f5bf2a67009cb5c7f7bb
SHA19e6434ae8cfa29860b24e93bab6903d792152496
SHA256bbd68336cf1a09f3f81881e94777735c89b8d76bef6244cbd60699e8b4287b68
SHA5120b8ccb419375e0d9e84030e13dd8b5b1158986b25281502a79d01df556911f475a0a17ae592ba44f1e221ffcea3cb9dc97fb1169653b0cbfd2a7de651c502f81