Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
nero5003.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nero5003.exe
Resource
win10v2004-20240226-en
General
-
Target
nero5003.exe
-
Size
4.8MB
-
MD5
86995dacb5cc846ccac5259fa1733a98
-
SHA1
5414507fbf243da9ab5b226b7a20edf3ef547b51
-
SHA256
e69418b7e7f9bb9e475ee0b78cd795ef1704b4a9e2e8cb096b3e461ba6c967d1
-
SHA512
7904ad040f331929deb38aa0261e5efc6465d193494a2ff566e7d6a69dc03a3124d60658a2f88af36b2f0c52525086b65458ad2c637a29197c73f915fcbfed46
-
SSDEEP
98304:YDWt6eKG/TAuWfF2ypAA4S+cvimg8X64ymsHIU3NFrZtoQ8xi:yWt6/Sye3S+cJX6HI4ttoQ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2620 4896 nero5003.exe 84 PID 4896 wrote to memory of 2620 4896 nero5003.exe 84 PID 4896 wrote to memory of 2620 4896 nero5003.exe 84
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5d36c63023197990ebcd22ae4dbc738c5
SHA198affca167da92545d822488002b5b59cf80f740
SHA256003ab9e59405ee7e6bf3a209484f482cd6b1daaf1f28700a5361101f6509b93f
SHA51200a287b37266f9c4a13d3f30b1f36fe0780bea047b8cffc702965bdbfd7e6cf10392c9465fe7320da926c537ff63cb85348bc8e7cffca1f7b9b0470f1420a4dc
-
Filesize
46KB
MD5e6799bde5dbd22a1e240eae3f0f3397f
SHA1b5180cec2c08ce1ff8580672acf8391f3c9fd705
SHA2561f48ff1421c10f2c9ca322b2cd2ec997577f2f05cd5841b41b4018cf60ef5f07
SHA512afe5f8d270d033c576a020091e48f071955126990d7a2cd123cb16f8fbc6887f5180373d7f3b9b45a5a80a6aa0285f43f45d848f8b1314424f8d565dd2f5f9c3