Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
nfsrvsetup.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
nfsrvsetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
nfsrvsetup.exe
-
Size
4.6MB
-
MD5
66834f29bc47e63854a3c754a30e3e38
-
SHA1
99ece366fbfccb50c076cfce5a8a7978c36381ce
-
SHA256
1a6d0edb456c5c8234bcee09c57c4554dbd66acd6ac4002d7d10cc59cc7e00ed
-
SHA512
43ae151e098a851f9ac381a1ac6e04b1bcfb4a289d5a3bbfd74a0703e95317bcdda38350f1243dddbe63d2301260a7fdff9354a7ffb0ed45042f581c531c6d7b
-
SSDEEP
98304:kh2JkCCuum+SlZYPudfMKEBHITLWrls4leKtte6SUWMWXW:22JkVxmV7bdfqBoTSls4lFouXWm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 is-VVFR9.tmp -
Loads dropped DLL 2 IoCs
pid Process 2020 is-VVFR9.tmp 2020 is-VVFR9.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4044 wrote to memory of 2020 4044 nfsrvsetup.exe 89 PID 4044 wrote to memory of 2020 4044 nfsrvsetup.exe 89 PID 4044 wrote to memory of 2020 4044 nfsrvsetup.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\nfsrvsetup.exe"C:\Users\Admin\AppData\Local\Temp\nfsrvsetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\is-6IQO9.tmp\is-VVFR9.tmp"C:\Users\Admin\AppData\Local\Temp\is-6IQO9.tmp\is-VVFR9.tmp" /SL4 $401EE "C:\Users\Admin\AppData\Local\Temp\nfsrvsetup.exe" 4610724 527362⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
657KB
MD5c0b0fbca8a1a513e12c1f018d32dbeb3
SHA1828248cfada6b67b587336a37a394111434609b9
SHA2565c278d68a914a63865aab5a683c0943d5f84ab218333b55fe65c2cb39cb0416a
SHA512bb62e356bb79d012bb7d44dc2c9912df0a086395fde7232c999f5fb9ea314635e25dbb05b1d874f9946410ced9490f5f7d12687253ee1613a2cb2d2264a8443a