Analysis

  • max time kernel
    145s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 13:40

General

  • Target

    NordVPNSetup.exe

  • Size

    1.7MB

  • MD5

    5d6f0577264346d7c28f1853871d89b7

  • SHA1

    a606fa6e79ed5ca473eed30cc8483901ca67fae1

  • SHA256

    391b613c8db8f21fe6545d6448adb188dd2b54749f31e7cd7abefb6e61f388d2

  • SHA512

    9d43f0ef1ed41ac338a157dbcc74e5ebdb00ff83935aeb96095af9fe780a2217ae6362e6577b51780baffcaa50e2ee8f0c92345a473a199da5897411d3f72159

  • SSDEEP

    24576:x7FUDowAyrTVE3U5FZvOcAqJys9vvys3gEhyel1XXkJ2k89zCA8:xBuZrEU1OMJys9HLRy3J2k8ob

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\is-0CHN4.tmp\NordVPNSetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0CHN4.tmp\NordVPNSetup.tmp" /SL5="$B0152,890444,866304,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabBD87.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBDA9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\is-0CHN4.tmp\NordVPNSetup.tmp

    Filesize

    3.1MB

    MD5

    6693ddaca0479cdeea33386155e9cacf

    SHA1

    0b426408257359afbcee9de1332804541aab1e89

    SHA256

    384dab757af95f6d6d4a80351507f6f455c0fce58f2aa32ff1c1e8ceeb3ade82

    SHA512

    8afc8322631da373c9ea09bc81df6c071ea760d9ac3535235c4f59768a1a8ffc654741205baddb4fed843eb20622e534432171e8f436a05e88fd320232df9678

  • \Users\Admin\AppData\Local\Temp\is-VIRI4.tmp\Nord.Setup.dll

    Filesize

    40KB

    MD5

    d9d4e2634af0b4e81d473e5a76df357f

    SHA1

    432e30a8e0e36cc764fd2d285fb197f13f1da811

    SHA256

    e897c29355a0e81e55fd9f8c74b52810a065e9e8c37a4c2ed813efb846c9e89f

    SHA512

    fd70402dfcad5152d8cc21dd37272dd421b56c7a21cdd2c46fa5c2232edf5a8a717a77e99fad59e4139bc24d8e93a7cd1f56dc4b2cc36364939a1597987ea4a8

  • memory/1292-0-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/1292-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/1292-176-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2308-10-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/2308-177-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB