Analysis

  • max time kernel
    118s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 17:03

General

  • Target

    a6b7ad43678fd4beb5910c67a637a6b0N.exe

  • Size

    159KB

  • MD5

    a6b7ad43678fd4beb5910c67a637a6b0

  • SHA1

    e28cdb51e85c9edd29cb7c6099ae29bef4991325

  • SHA256

    49c33a9bb9e5ffbe3a86d33ae3fb6c58633b81aad43547591be10126841ef6d0

  • SHA512

    50f03fc12e96be7cca21a1ff9a391fbd9eba3f1af926994b1f72182fb008cd4d3658230c3a710747a2d6dc8da477f6cd705a6bc85fcb399994ec190fd99ebe54

  • SSDEEP

    3072:tx1TajppFJN7hyH8He6am2iQPgpKoVjM3N9XZbcqZcquHRg:r1TaFpR7UIttrQGvC991c+cD

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6b7ad43678fd4beb5910c67a637a6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6b7ad43678fd4beb5910c67a637a6b0N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\a6b7ad43678fd4beb5910c67a637a6b0N.exe
      "C:\Users\Admin\AppData\Local\Temp\a6b7ad43678fd4beb5910c67a637a6b0N.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\nusb3mon.exe
        "C:\Windows\nusb3mon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Windows\nusb3mon.exe
          "C:\Windows\nusb3mon.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Windows\syswow64\userinit.exe
            "C:\Windows\syswow64\userinit.exe"
            5⤵
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Windows\syswow64\explorer.exe
              "C:\Windows\syswow64\explorer.exe"
              6⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\nusb3mon.lnk

          Filesize

          741B

          MD5

          038b2791b4234ffa9493bf0459066013

          SHA1

          86e088e5bbe75b6f7f54372b8791dd4e6633c64c

          SHA256

          6e4faa1aba0f9d012d8655f1f5256551b5adeaa03441a233068142720ef480aa

          SHA512

          3926a420076dfbe37657a9f901bb8c9a1087119f8c492ddf359d9554c24586ebc28776c1a301b4ab8078584a559cb75b8f8879fae032983c8a7ae800b18442cd

        • C:\Windows\c39b355

          Filesize

          1KB

          MD5

          dc0c5e9e5dea1066c1f81d950ea68b66

          SHA1

          e839da4fd2ca627622711b2041c1a0f6c28288ea

          SHA256

          8d7d36dafa8aef9b7fbd9bb269356203932b0297c615c5955cdff8bd94e52d56

          SHA512

          01ddc2043e569aecaf30ee3f63579be3d99e245c34151a3d0bc5f8e5042561b800fe15cf0261e31dd514cb0c91e6f2a5ce3e3d4bd92d6086531bcca5105d6b1a

        • C:\Windows\nusb3mon.exe

          Filesize

          159KB

          MD5

          2256cdb95672025d54fb1479fd719fa5

          SHA1

          8d44c59546799170876d7acd75fc05791cf39150

          SHA256

          2f5a13f47ec360a05a4fa7fa94527ece1977b14d8bcd839d3cc46d4233664d10

          SHA512

          fbd582122a0cd8c62b23164442e1cafd4871cbee8f01017e20347f1113c7087b9fafe087976ab25519354b30a00a776e091d786a84bdac523caf41a8ab63b62a

        • memory/1768-297-0x0000000000120000-0x0000000000133000-memory.dmp

          Filesize

          76KB

        • memory/1768-423-0x0000000000120000-0x0000000000133000-memory.dmp

          Filesize

          76KB

        • memory/2052-32-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-41-0x0000000000BA0000-0x0000000000CB0000-memory.dmp

          Filesize

          1.1MB

        • memory/2052-59-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

          Filesize

          1024KB

        • memory/2052-67-0x0000000000110000-0x0000000000167000-memory.dmp

          Filesize

          348KB

        • memory/2052-65-0x0000000000110000-0x0000000000167000-memory.dmp

          Filesize

          348KB

        • memory/2052-63-0x0000000000110000-0x0000000000167000-memory.dmp

          Filesize

          348KB

        • memory/2052-61-0x0000000000110000-0x0000000000167000-memory.dmp

          Filesize

          348KB

        • memory/2052-57-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

          Filesize

          1024KB

        • memory/2052-53-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

          Filesize

          1024KB

        • memory/2052-55-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/2052-54-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-51-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

          Filesize

          1024KB

        • memory/2052-49-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

          Filesize

          1024KB

        • memory/2052-47-0x0000000000BA0000-0x0000000000CB0000-memory.dmp

          Filesize

          1.1MB

        • memory/2052-43-0x0000000000BA0000-0x0000000000CB0000-memory.dmp

          Filesize

          1.1MB

        • memory/2052-28-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-35-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-34-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-33-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-13-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-31-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-30-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-36-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-29-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-26-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-45-0x0000000000BA0000-0x0000000000CB0000-memory.dmp

          Filesize

          1.1MB

        • memory/2052-39-0x0000000000BA0000-0x0000000000CB0000-memory.dmp

          Filesize

          1.1MB

        • memory/2052-14-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2052-38-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-37-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-25-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-24-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-22-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-20-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-18-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-16-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-27-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2052-1-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-9-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-7-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-3-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-5-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2052-409-0x0000000000070000-0x0000000000083000-memory.dmp

          Filesize

          76KB

        • memory/2160-0-0x0000000000070000-0x0000000000071000-memory.dmp

          Filesize

          4KB