Overview
overview
10Static
static
InstallerAppSetup.exe
windows7-x64
10InstallerAppSetup.exe
windows10-2004-x64
10Uses of Ad...ex.dll
windows7-x64
8Uses of Ad...ex.dll
windows10-2004-x64
8Uses of Ad...0x.exe
windows7-x64
Uses of Ad...0x.exe
windows10-2004-x64
Uses of Ad...ir.exe
windows7-x64
Uses of Ad...ir.exe
windows10-2004-x64
Uses of Ad...3x.exe
windows7-x64
Uses of Ad...3x.exe
windows10-2004-x64
Uses of Ad...31.exe
windows7-x64
Uses of Ad...31.exe
windows10-2004-x64
Uses of Ad...10.exe
windows7-x64
Uses of Ad...10.exe
windows10-2004-x64
Uses of Ad...ex.dll
windows7-x64
1Uses of Ad...ex.dll
windows10-2004-x64
1Uses of Ad...ex.dll
windows7-x64
8Uses of Ad...ex.dll
windows10-2004-x64
8Uses of Ad...0x.exe
windows7-x64
Uses of Ad...0x.exe
windows10-2004-x64
Uses of Ad...ir.exe
windows7-x64
Uses of Ad...ir.exe
windows10-2004-x64
Uses of Ad...ex.dll
windows7-x64
1Uses of Ad...ex.dll
windows10-2004-x64
1Uses of Ad...0x.exe
windows7-x64
Uses of Ad...0x.exe
windows10-2004-x64
Uses of Ad...ir.exe
windows7-x64
Uses of Ad...ir.exe
windows10-2004-x64
Uses of Ad...3x.exe
windows7-x64
Uses of Ad...3x.exe
windows10-2004-x64
Uses of Ad...31.exe
windows7-x64
Uses of Ad...31.exe
windows10-2004-x64
Analysis
-
max time kernel
99s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2023, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
InstallerAppSetup.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
InstallerAppSetup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/bhkspex.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/bhkspex.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cx2310x.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cx2310x.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cxpolir.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cxpolir.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa713x.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa713x.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa7231.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa7231.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/ttm6010.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/ttm6010.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
Uses of Additional Files/WinAll/BeholdTV/cx2310x.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Uses of Additional Files/WinAll/BeholdTV/cx2310x.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
Uses of Additional Files/WinAll/BeholdTV/cxpolir.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Uses of Additional Files/WinAll/BeholdTV/cxpolir.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/bhkspex.dll
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/bhkspex.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/cx2310x.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/cx2310x.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/cxpolir.exe
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/cxpolir.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/saa713x.exe
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/saa713x.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/saa7231.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
Uses of Additional Files/WinAll/BeholdTV/i386/saa7231.exe
Resource
win10v2004-20221111-en
General
-
Target
InstallerAppSetup.exe
-
Size
325.9MB
-
MD5
eef2077222940d85cb9571717c29d263
-
SHA1
55cf9ddfab15589836f4bb5e50cfefab06f9a921
-
SHA256
fa838b0dbb429c61dcbef1a837e6840d6cfe8928c120dc76a30fb7146e7edcdb
-
SHA512
3e86e9fbb950bf515500cd3361a9348c6ac8474b074048ac7e03edf12d7d004ee5318568af61dd600bce866a59b54e5cf4efc544d93deda912d8a383e5865653
-
SSDEEP
49152:im6vBTjPh5zriTZ6KeC+LkT/RhlqCPFhMNvGQGQsQe8y15/jz7KiGlTT+5Gtoiy2:imgTK6Ah5gTZgoGx0Ivx0wWKf4F/VB
Malware Config
Extracted
cryptbot
http://luvasm712.top/gate.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3488 mchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation InstallerAppSetup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum InstallerAppSetup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 InstallerAppSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallerAppSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz InstallerAppSetup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 InstallerAppSetup.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5108 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 InstallerAppSetup.exe 2508 InstallerAppSetup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2508 wrote to memory of 4012 2508 InstallerAppSetup.exe 80 PID 2508 wrote to memory of 4012 2508 InstallerAppSetup.exe 80 PID 2508 wrote to memory of 4012 2508 InstallerAppSetup.exe 80 PID 4012 wrote to memory of 4844 4012 cmd.exe 82 PID 4012 wrote to memory of 4844 4012 cmd.exe 82 PID 4012 wrote to memory of 4844 4012 cmd.exe 82 PID 2508 wrote to memory of 2264 2508 InstallerAppSetup.exe 83 PID 2508 wrote to memory of 2264 2508 InstallerAppSetup.exe 83 PID 2508 wrote to memory of 2264 2508 InstallerAppSetup.exe 83 PID 2264 wrote to memory of 5108 2264 cmd.exe 85 PID 2264 wrote to memory of 5108 2264 cmd.exe 85 PID 2264 wrote to memory of 5108 2264 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerAppSetup.exe"C:\Users\Admin\AppData\Local\Temp\InstallerAppSetup.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exe/C schtasks /create /tn \Mozilla\bqwggods /tr """"C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.exe""" """C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.chm"""" /du 9700:20 /sc once /st 00:05 /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Mozilla\bqwggods /tr """"C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.exe""" """C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.chm"""" /du 9700:20 /sc once /st 00:05 /ri 1 /f3⤵
- Creates scheduled task(s)
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\InstallerAppSetup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- Delays execution with timeout.exe
PID:5108
-
-
-
C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.exeC:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.exe "C:\Users\Admin\AppData\Roaming\pdsveoiww\mchost.chm"1⤵
- Executes dropped EXE
PID:3488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD596907358470716ecd839c83cbd2bd71c
SHA10e68ba16a07d9bb258e871360602ac86cf807e9a
SHA256bf431dfaf39b3daa481b16a9593993d3a05e08564bf3b0fbca183d3e6c7ffd86
SHA512cbecc8ad928b2c9ff9d7b121610712f7bc4d9f01b1b14e4f198329ba2a14108196a7c5b6bda70a9939583543f3bffda31a9842d1dccf7f26491fa7226846eeb1
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c