Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
d9b10629800aa867f8d101bd5c86d6b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9b10629800aa867f8d101bd5c86d6b0N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240709-en
General
-
Target
d9b10629800aa867f8d101bd5c86d6b0N.exe
-
Size
406KB
-
MD5
d9b10629800aa867f8d101bd5c86d6b0
-
SHA1
b446611eb498be1fdc2f38db0fc588245cb50e76
-
SHA256
5f438dc2e4b0e3a09e635302e608db2fc9900dbce22c13b5a57122d659bf5802
-
SHA512
0ee2cc6dbfc77b45fa042075e43c0434f8083e72850b1b187659c0049cbbff0b6acc106a60f68c71d0893b47a7641c7d93d0be05cee9cbf6af4a23fbed76978c
-
SSDEEP
1536:Y/T2X/jN2vxZz0DTHUpou3YUl5W01lrB60DdRWPhntLydVVWWzKJ0VC3ApG:YbG7N2kDTHUpou1HZmh4VC3ApG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 d9b10629800aa867f8d101bd5c86d6b0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2664 2084 d9b10629800aa867f8d101bd5c86d6b0N.exe 30 PID 2084 wrote to memory of 2664 2084 d9b10629800aa867f8d101bd5c86d6b0N.exe 30 PID 2084 wrote to memory of 2664 2084 d9b10629800aa867f8d101bd5c86d6b0N.exe 30 PID 2084 wrote to memory of 2664 2084 d9b10629800aa867f8d101bd5c86d6b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9b10629800aa867f8d101bd5c86d6b0N.exe"C:\Users\Admin\AppData\Local\Temp\d9b10629800aa867f8d101bd5c86d6b0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5d9b10629800aa867f8d101bd5c86d6b0
SHA1b446611eb498be1fdc2f38db0fc588245cb50e76
SHA2565f438dc2e4b0e3a09e635302e608db2fc9900dbce22c13b5a57122d659bf5802
SHA5120ee2cc6dbfc77b45fa042075e43c0434f8083e72850b1b187659c0049cbbff0b6acc106a60f68c71d0893b47a7641c7d93d0be05cee9cbf6af4a23fbed76978c