Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 02:40

General

  • Target

    $SYSDIR/adzgalore-remove.exe

  • Size

    99KB

  • MD5

    31709de9a5d9f2906dce36c836e4e055

  • SHA1

    cc59ca78fa077fff9384570189ac16b091bf49ec

  • SHA256

    21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5

  • SHA512

    bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74

  • SSDEEP

    1536:WUeHiWRgkkjH8nyWmJPnWb/Nv07LVpN6MzPY0rBAWCKSjqBkHBTXHccDuVbH8k5O:Wd/vyWmJqG7/wu6WCqGdccDc775kMZI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe
    "C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nswD62F.tmp\InstallOptions.dll

    Filesize

    117KB

    MD5

    cd6e705cc6992e869f488ab211ac37cb

    SHA1

    c9c71edd929c15bcf5ee286d4a9e9259d1590eb5

    SHA256

    44e729371099650904bcd5db0af7fdad6ffc01e336ae464f0bb151f329175292

    SHA512

    460173bbcff640721e54bb403e1f46d274e649a9db7d3b83d009a7f00354d434874dfdc009679e98cfb05548801b9eee78c25fe17b083fac396087ad3327debf

  • C:\Users\Admin\AppData\Local\Temp\nswD62F.tmp\validate.ini

    Filesize

    457B

    MD5

    4d023e0570bd838b5c925d9252305c91

    SHA1

    f89742f5e052c699dd87726c6f3e3ca9885bfe38

    SHA256

    7f8f1ddca6f57c6b1c76709a5f7e1cd0024b1182fb76de432b797d85ebac0a2a

    SHA512

    af9645a288282e5f955226b3b93f98ff4fc0df11b6ceaffec8fe1d56873b69eca2d52a17172fa973a31e76587513f02140eb9d5a16949e00a7590453a6cf6e13

  • C:\Users\Admin\AppData\Local\Temp\nswD62F.tmp\validate.ini

    Filesize

    545B

    MD5

    a226cc607bcb0e586e95d66d714eacf0

    SHA1

    5e0c1d4dad61a07c26dde8cc2992477bb72bf14f

    SHA256

    bb1d78376377c81d468ec8c78b1210776c7bc32abb6c5e37c371444f3923be63

    SHA512

    2a7ea2f9c9593ab502a1e1ae7c144fe209be9d679650f11deba2909a5ed27ec875eb4addc3ac5615ca4d88e8ec33796ff2f827b134e62b258025dc0db28be959

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    99KB

    MD5

    31709de9a5d9f2906dce36c836e4e055

    SHA1

    cc59ca78fa077fff9384570189ac16b091bf49ec

    SHA256

    21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5

    SHA512

    bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74