Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 02:40

General

  • Target

    $SYSDIR/adzgalore-remove.exe

  • Size

    99KB

  • MD5

    31709de9a5d9f2906dce36c836e4e055

  • SHA1

    cc59ca78fa077fff9384570189ac16b091bf49ec

  • SHA256

    21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5

  • SHA512

    bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74

  • SSDEEP

    1536:WUeHiWRgkkjH8nyWmJPnWb/Nv07LVpN6MzPY0rBAWCKSjqBkHBTXHccDuVbH8k5O:Wd/vyWmJqG7/wu6WCqGdccDc775kMZI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe
    "C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsj800C.tmp\InstallOptions.dll

    Filesize

    117KB

    MD5

    cd6e705cc6992e869f488ab211ac37cb

    SHA1

    c9c71edd929c15bcf5ee286d4a9e9259d1590eb5

    SHA256

    44e729371099650904bcd5db0af7fdad6ffc01e336ae464f0bb151f329175292

    SHA512

    460173bbcff640721e54bb403e1f46d274e649a9db7d3b83d009a7f00354d434874dfdc009679e98cfb05548801b9eee78c25fe17b083fac396087ad3327debf

  • C:\Users\Admin\AppData\Local\Temp\nsj800C.tmp\validate.ini

    Filesize

    545B

    MD5

    25c120d9bfb2bf6cdc7d6548201ab4f3

    SHA1

    ffef7d23c1252e571b5a8f681667a873592e545b

    SHA256

    8c01b7a65d2c86fc326bca8aa49de9a84882be2920264a82dde94794a70d9f91

    SHA512

    040b0b1e8bffb56fcfe9fef11b80f51761e7c76b3e26a17ebbcec6ea9b2afaeb4c2024a7f73a268431c2835ae6ad81ef2f1117d65f1874b04fac43987ba2b5d6

  • C:\Users\Admin\AppData\Local\Temp\nsj800C.tmp\validate.ini

    Filesize

    509B

    MD5

    041dc0ad4bcb725323cba55337b86682

    SHA1

    6447b3327e92304e1e9bc78fb09150188fd4f578

    SHA256

    d4bbec17ff3ed87119d69c327f3488a70538d12c582a152f89f3754896bb6922

    SHA512

    6d960ef34a2272c42a80d3c8548d93f1dafe354dc740a4d5aae08783c7d15a620429b55782b07a40821ffa15c374ba4aa89e1bdf7f8229834c1b3161feab9d3e

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    99KB

    MD5

    31709de9a5d9f2906dce36c836e4e055

    SHA1

    cc59ca78fa077fff9384570189ac16b091bf49ec

    SHA256

    21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5

    SHA512

    bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74