Analysis
-
max time kernel
24s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
Teklynx.LabelView.Gold.v8.10.06-NULL-Crack/lv_setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Teklynx.LabelView.Gold.v8.10.06-NULL-Crack/lv_setup.exe
Resource
win10v2004-20221111-en
General
-
Target
Teklynx.LabelView.Gold.v8.10.06-NULL-Crack/lv_setup.exe
-
Size
40.1MB
-
MD5
997c3a2e44d85d5d4629ff7ba1f2ea75
-
SHA1
ef99ac0db3766b40f30a6ff6a1bea8a97ca12bb8
-
SHA256
d7e371d65a908d2835844e999760e7f8a967c9402200b962ed6de34cadd812ad
-
SHA512
fe5613bcd0f1669c856dfb9b7fbeb69cd5673710e87124d6b569520c0830b690ee402ae2633a5770c975874318c7f03f5576592636104cd0064ebebb5091433d
-
SSDEEP
393216:HEWhcnO/kihgI0qg5uSDa64CNgwD+D0cl7EqiMl1KB3HxGhpO:xcOTuNH5VDQ47Dumqf43xGhg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lv_setup.exepid process 1580 lv_setup.exe -
Loads dropped DLL 1 IoCs
Processes:
lv_setup.exepid process 1960 lv_setup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
lv_setup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run lv_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lv = "C:\\Users\\Public\\Guyvz\\Avlh.exe /lv" lv_setup.exe -
Processes:
lv_setup.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a803000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 lv_setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU lv_setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" lv_setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" lv_setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" lv_setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" lv_setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lv_setup.exepid process 1960 lv_setup.exe 1960 lv_setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Teklynx.LabelView.Gold.v8.10.06-NULL-Crack\lv_setup.exe"C:\Users\Admin\AppData\Local\Temp\Teklynx.LabelView.Gold.v8.10.06-NULL-Crack\lv_setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Kurou831\lv_setup.exeC:\Users\Admin\AppData\Local\Temp\Kurou831\lv_setup.exe2⤵
- Executes dropped EXE
PID:1580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD515fbb287508f8f1811253c2c7b05bb60
SHA17900c264bd8e2c66b8e6d8579c3e0f490f6e9d67
SHA256a457315af1c1d06f6c3a571aa7dbe39217a4133338f09506705ce17ab3495c53
SHA5121bfee16fc8b133d4678cc3e2afbbba50c8976d310b55764653d4ebff220857fdb28c9f596016f3ce8d6660b25d3b50988f83cead050aa391f42ea6f59ff7686c
-
Filesize
6.2MB
MD515fbb287508f8f1811253c2c7b05bb60
SHA17900c264bd8e2c66b8e6d8579c3e0f490f6e9d67
SHA256a457315af1c1d06f6c3a571aa7dbe39217a4133338f09506705ce17ab3495c53
SHA5121bfee16fc8b133d4678cc3e2afbbba50c8976d310b55764653d4ebff220857fdb28c9f596016f3ce8d6660b25d3b50988f83cead050aa391f42ea6f59ff7686c