Resubmissions

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

29-08-2021 11:37

210829-18htk4slyj 10

28-08-2021 23:10

210828-rt8b9gzxn6 10

28-08-2021 22:59

210828-zxgnh5j4w6 10

28-08-2021 11:31

210828-xrjs66aknj 10

Analysis

  • max time kernel
    305s
  • max time network
    1603s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    22-08-2021 21:19

General

  • Target

    Setup (31).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (31).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (31).exe"
    1⤵
      PID:4876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 1968
        2⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5036
    • C:\Windows\System32\sihclient.exe
      C:\Windows\System32\sihclient.exe /cv 8PFJ7Xr/RkiQhw851r/usQ.0.2
      1⤵
      • Modifies data under HKEY_USERS
      PID:3892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4876 -ip 4876
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:2344
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Modifies data under HKEY_USERS
      PID:4956
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
      1⤵
        PID:4564

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4956-146-0x0000019B32A60000-0x0000019B32A70000-memory.dmp
        Filesize

        64KB

      • memory/4956-147-0x0000019B32AE0000-0x0000019B32AF0000-memory.dmp
        Filesize

        64KB

      • memory/4956-148-0x0000019B350B0000-0x0000019B350B4000-memory.dmp
        Filesize

        16KB

      • memory/4956-149-0x0000019B353A0000-0x0000019B353A4000-memory.dmp
        Filesize

        16KB

      • memory/4956-150-0x0000019B35360000-0x0000019B35361000-memory.dmp
        Filesize

        4KB

      • memory/4956-151-0x0000019B350E0000-0x0000019B350E4000-memory.dmp
        Filesize

        16KB

      • memory/4956-152-0x0000019B350D0000-0x0000019B350D1000-memory.dmp
        Filesize

        4KB

      • memory/4956-154-0x0000019B32DB0000-0x0000019B32DB1000-memory.dmp
        Filesize

        4KB

      • memory/4956-153-0x0000019B350D0000-0x0000019B350D4000-memory.dmp
        Filesize

        16KB