Analysis
-
max time kernel
1204s -
max time network
1233s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/01/2023, 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Setup.zip
Resource
win10-20220812-en
11 signatures
1800 seconds
General
-
Target
Setup.zip
-
Size
12.4MB
-
MD5
fa43942c3d0e54848ec5011d11fcd461
-
SHA1
682826ff0ccff73588ae189e11a864b0ff6eae63
-
SHA256
d151244cdf8b11a9ee8a08367fb372eb33276ff4fff5d895c15d547fbc44705f
-
SHA512
e4c2a3715b6e01d1940c5994537ac48469eacdfa0f7eee57592736f4701da45554f2b52f0d0fac4cc5b361ab1b9f972afdbc8d68e272263e3bb75e3eb247c623
-
SSDEEP
393216:cuuWKKEH+yoneIi/IxB99uFkK5DByGLO8glS/FSr:eYNyone2BPG649Sr
Score
6/10
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 5068 taskmgr.exe Token: SeSystemProfilePrivilege 5068 taskmgr.exe Token: SeCreateGlobalPrivilege 5068 taskmgr.exe Token: 33 5068 taskmgr.exe Token: SeIncBasePriorityPrivilege 5068 taskmgr.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe 5068 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2836 xpsrchvw.exe 2836 xpsrchvw.exe 2836 xpsrchvw.exe 2836 xpsrchvw.exe 2452 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2440 wrote to memory of 2452 2440 firefox.exe 85 PID 2452 wrote to memory of 2980 2452 firefox.exe 87 PID 2452 wrote to memory of 2980 2452 firefox.exe 87 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 2428 2452 firefox.exe 88 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89 PID 2452 wrote to memory of 1080 2452 firefox.exe 89
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Setup.zip1⤵PID:2248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4608
-
C:\Windows\System32\xpsrchvw.exe"C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Downloads\AssertWatch.edrwx"1⤵
- Suspicious use of SetWindowsHookEx
PID:2836
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:5040
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:2496
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:2240
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:4552
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:4292
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.0.589867269\452992301" -parentBuildID 20200403170909 -prefsHandle 1516 -prefMapHandle 1508 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 1596 gpu3⤵PID:2980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.3.785718548\1097194494" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 2124 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 2196 tab3⤵PID:2428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.13.1455336688\510991560" -childID 2 -isForBrowser -prefsHandle 3372 -prefMapHandle 3396 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 3408 tab3⤵PID:1080
-
-
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:1664
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5068
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:1152
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:3956
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:3040
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:1472
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:1752
-
C:\Users\Admin\Downloads\Setup\Setup.exe"C:\Users\Admin\Downloads\Setup\Setup.exe"1⤵PID:3240