Overview
overview
10Static
static
Setup1.3/Setup.exe
windows7-x64
10Setup1.3/Setup.exe
windows10-2004-x64
10Setup1.3/libEGL.dll
windows7-x64
1Setup1.3/libEGL.dll
windows10-2004-x64
1Setup1.3/l...V2.dll
windows7-x64
1Setup1.3/l...V2.dll
windows10-2004-x64
1Setup1.3/msvcp120.dll
windows7-x64
3Setup1.3/msvcp120.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2022, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Setup1.3/Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Setup1.3/Setup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Setup1.3/libEGL.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Setup1.3/libEGL.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Setup1.3/libGLESV2.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Setup1.3/libGLESV2.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Setup1.3/msvcp120.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Setup1.3/msvcp120.dll
Resource
win10v2004-20220901-en
General
-
Target
Setup1.3/Setup.exe
-
Size
219KB
-
MD5
6aad758680ee8382509078b8d3313b23
-
SHA1
9663d3386c557637864082ff3572de53acc223b0
-
SHA256
46fb066036bdb30458f53f50dae74071ca3c92d3b5b80af2c2033514691a820e
-
SHA512
4d021e3880f183990213346f62dbae75cfd42e22cbe86d99d715b6f2dac5224bbc74626ee5707bb70c8b19f64f843ac8a0b0bfefbf3265a72086af6a572ec1dd
-
SSDEEP
6144:s71Yq5f9cbMee66SCwfYXbyLuBzMAOu0CExi:s71Yw9cbMee667LMcbEx
Malware Config
Extracted
erbium
http://77.73.133.53/cloud/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 98032 qsasgjmwhsonrfzd.exe 4580 svcupdater.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 97948 3708 Setup.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 98072 3708 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 98064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 97948 AppLaunch.exe 97948 AppLaunch.exe 98032 qsasgjmwhsonrfzd.exe 98032 qsasgjmwhsonrfzd.exe 98032 qsasgjmwhsonrfzd.exe 98032 qsasgjmwhsonrfzd.exe 98032 qsasgjmwhsonrfzd.exe 98032 qsasgjmwhsonrfzd.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe 4580 svcupdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 98032 qsasgjmwhsonrfzd.exe Token: SeDebugPrivilege 4580 svcupdater.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3708 wrote to memory of 97948 3708 Setup.exe 81 PID 3708 wrote to memory of 97948 3708 Setup.exe 81 PID 3708 wrote to memory of 97948 3708 Setup.exe 81 PID 3708 wrote to memory of 97948 3708 Setup.exe 81 PID 3708 wrote to memory of 97948 3708 Setup.exe 81 PID 97948 wrote to memory of 98032 97948 AppLaunch.exe 88 PID 97948 wrote to memory of 98032 97948 AppLaunch.exe 88 PID 97948 wrote to memory of 98032 97948 AppLaunch.exe 88 PID 98032 wrote to memory of 2220 98032 qsasgjmwhsonrfzd.exe 90 PID 98032 wrote to memory of 2220 98032 qsasgjmwhsonrfzd.exe 90 PID 98032 wrote to memory of 2220 98032 qsasgjmwhsonrfzd.exe 90 PID 2220 wrote to memory of 98064 2220 cmd.exe 92 PID 2220 wrote to memory of 98064 2220 cmd.exe 92 PID 2220 wrote to memory of 98064 2220 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup1.3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup1.3\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:97948 -
C:\Users\Admin\AppData\Local\Temp\qsasgjmwhsonrfzd.exe"C:\Users\Admin\AppData\Local\Temp\qsasgjmwhsonrfzd.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:98032 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /tn \j9rn7w1385 /tr "C:\Users\Admin\AppData\Roaming\j9rn7w1385\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \j9rn7w1385 /tr "C:\Users\Admin\AppData\Roaming\j9rn7w1385\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:98064
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 951362⤵
- Program crash
PID:98072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3708 -ip 37081⤵PID:98032
-
C:\Users\Admin\AppData\Roaming\j9rn7w1385\svcupdater.exeC:\Users\Admin\AppData\Roaming\j9rn7w1385\svcupdater.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD576de5446bd4427858e8a3b12b3d15f77
SHA1bcfb172c494e3d543d3797dd57222d2aa5984dc0
SHA2568789899d36045ba32e9ca43e663d3ae1b0ce7fec8c4a5f63d604900d4796cd84
SHA5120ec3c80fdcd76f6e011ae16bbbfbb37b0a16af3e360512035925df2d9333f353c396b05b79e45b677bb812eae3b629673c488a0c299c3f4d87c8bcb80ee4cf66
-
Filesize
132KB
MD576de5446bd4427858e8a3b12b3d15f77
SHA1bcfb172c494e3d543d3797dd57222d2aa5984dc0
SHA2568789899d36045ba32e9ca43e663d3ae1b0ce7fec8c4a5f63d604900d4796cd84
SHA5120ec3c80fdcd76f6e011ae16bbbfbb37b0a16af3e360512035925df2d9333f353c396b05b79e45b677bb812eae3b629673c488a0c299c3f4d87c8bcb80ee4cf66
-
Filesize
132KB
MD576de5446bd4427858e8a3b12b3d15f77
SHA1bcfb172c494e3d543d3797dd57222d2aa5984dc0
SHA2568789899d36045ba32e9ca43e663d3ae1b0ce7fec8c4a5f63d604900d4796cd84
SHA5120ec3c80fdcd76f6e011ae16bbbfbb37b0a16af3e360512035925df2d9333f353c396b05b79e45b677bb812eae3b629673c488a0c299c3f4d87c8bcb80ee4cf66
-
Filesize
132KB
MD576de5446bd4427858e8a3b12b3d15f77
SHA1bcfb172c494e3d543d3797dd57222d2aa5984dc0
SHA2568789899d36045ba32e9ca43e663d3ae1b0ce7fec8c4a5f63d604900d4796cd84
SHA5120ec3c80fdcd76f6e011ae16bbbfbb37b0a16af3e360512035925df2d9333f353c396b05b79e45b677bb812eae3b629673c488a0c299c3f4d87c8bcb80ee4cf66