Analysis

  • max time kernel
    11s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-09-2024 09:37

General

  • Target

    SuperNova.exe

  • Size

    319KB

  • MD5

    139874ded78aa99b323dba8eac9c9956

  • SHA1

    b5baf7067dcb33b9679ec0188e27e93c3fd70369

  • SHA256

    569f306077e35e7fbc449095ce624000939b8f27e68f6bcef908173675118ac9

  • SHA512

    bc2bf447e8f06f8dbd3f55a1954ad6137abae2d3c57e471dc1d701ef3ae0dd2263a271af99c09b609b2eeb2c24548650182e1bc18ef75e78a0bf2b559006bc6b

  • SSDEEP

    6144:Z4FLwAiLQyi6nn1VredEGZGa0Xv50evr1ChZ9bRPXlwAiLQT:ZILwAiG8f3GZ3Q1S9bR9wAiY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SuperNova.exe
    "C:\Users\Admin\AppData\Local\Temp\SuperNova.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4356-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

    Filesize

    4KB

  • memory/4356-1-0x0000000000550000-0x00000000005A4000-memory.dmp

    Filesize

    336KB

  • memory/4356-2-0x0000000005560000-0x0000000005B06000-memory.dmp

    Filesize

    5.6MB

  • memory/4356-3-0x0000000004F00000-0x0000000004F92000-memory.dmp

    Filesize

    584KB

  • memory/4356-4-0x00000000050D0000-0x00000000050DA000-memory.dmp

    Filesize

    40KB

  • memory/4356-5-0x0000000074D30000-0x00000000754E1000-memory.dmp

    Filesize

    7.7MB

  • memory/4356-6-0x0000000074D30000-0x00000000754E1000-memory.dmp

    Filesize

    7.7MB

  • memory/4356-7-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

    Filesize

    4KB

  • memory/4356-8-0x0000000074D30000-0x00000000754E1000-memory.dmp

    Filesize

    7.7MB

  • memory/4356-10-0x0000000074D30000-0x00000000754E1000-memory.dmp

    Filesize

    7.7MB