Analysis Overview
SHA256
d49c678df0914e0855d29a855b37d39f0c745a507660ee10c1d1022140d3205c
Threat Level: Known bad
The file SetupApp_v6.7.1.zip was found to be: Known bad.
Malicious Activity Summary
Aurora
Blocklisted process makes network request
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of SetThreadContext
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-26 16:36
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-26 16:35
Reported
2023-01-26 16:40
Platform
win7-20221111-en
Max time kernel
24s
Max time network
30s
Command Line
Signatures
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1276 wrote to memory of 904 | N/A | C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1276 wrote to memory of 904 | N/A | C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1276 wrote to memory of 904 | N/A | C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1276 wrote to memory of 904 | N/A | C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe
"C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"
Network
Files
memory/1276-54-0x0000000000A30000-0x0000000000A78000-memory.dmp
memory/1276-55-0x0000000074DE1000-0x0000000074DE3000-memory.dmp
memory/904-56-0x0000000000000000-mapping.dmp
memory/904-58-0x0000000072FA0000-0x000000007354B000-memory.dmp
memory/904-59-0x0000000072FA0000-0x000000007354B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-01-26 16:35
Reported
2023-01-26 16:40
Platform
win10v2004-20220812-en
Max time kernel
148s
Max time network
154s
Command Line
Signatures
Aurora
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1404 set thread context of 1336 | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 34 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 35 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 36 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 34 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 35 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: 36 | N/A | C:\Windows\SysWOW64\Wbem\wmic.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
| Token: 36 | N/A | C:\Windows\SysWOW64\Wbem\WMIC.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Windows NT\Accessories\WORDPAD.EXE | N/A |
| N/A | N/A | C:\Program Files\Windows NT\Accessories\WORDPAD.EXE | N/A |
| N/A | N/A | C:\Program Files\Windows NT\Accessories\WORDPAD.EXE | N/A |
| N/A | N/A | C:\Program Files\Windows NT\Accessories\WORDPAD.EXE | N/A |
| N/A | N/A | C:\Program Files\Windows NT\Accessories\WORDPAD.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe
"C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\SetupApp_v6.7.1.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
C:\Windows\SysWOW64\Wbem\wmic.exe
wmic os get Caption
C:\Windows\SysWOW64\cmd.exe
cmd /C "wmic path win32_VideoController get name"
C:\Windows\SysWOW64\Wbem\WMIC.exe
wmic path win32_VideoController get name
C:\Windows\SysWOW64\cmd.exe
cmd /C "wmic cpu get name"
C:\Windows\SysWOW64\Wbem\WMIC.exe
wmic cpu get name
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb edit "C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\Lib\apogee\warmusVeiners\gyrosynRivellExtruct.xml"
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\SetupApp_v6.7.1\Lib\apogee\warmusVeiners\gyrosynRivellExtruct.xml"
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
Network
| Country | Destination | Domain | Proto |
| N/A | 93.184.220.29:80 | tcp | |
| N/A | 45.93.201.114:80 | 45.93.201.114 | tcp |
| N/A | 209.197.3.8:80 | tcp | |
| N/A | 209.197.3.8:80 | tcp | |
| N/A | 104.80.225.205:443 | tcp | |
| N/A | 45.15.156.219:8081 | tcp | |
| N/A | 52.182.143.208:443 | tcp | |
| N/A | 209.197.3.8:80 | tcp | |
| N/A | 209.197.3.8:80 | tcp | |
| N/A | 209.197.3.8:80 | tcp |
Files
memory/4772-132-0x0000000000610000-0x0000000000658000-memory.dmp
memory/4772-133-0x0000000005650000-0x0000000005BF4000-memory.dmp
memory/4772-134-0x00000000050A0000-0x0000000005132000-memory.dmp
memory/4772-135-0x0000000005010000-0x000000000501A000-memory.dmp
memory/1404-136-0x0000000000000000-mapping.dmp
memory/1404-137-0x0000000002D40000-0x0000000002D76000-memory.dmp
memory/1404-138-0x00000000057B0000-0x0000000005DD8000-memory.dmp
memory/1404-139-0x0000000005780000-0x00000000057A2000-memory.dmp
memory/1404-140-0x0000000005F50000-0x0000000005FB6000-memory.dmp
memory/1404-141-0x0000000005FC0000-0x0000000006026000-memory.dmp
memory/1404-142-0x00000000066D0000-0x00000000066EE000-memory.dmp
memory/1404-143-0x00000000076B0000-0x00000000076F4000-memory.dmp
memory/1404-144-0x00000000079D0000-0x0000000007A46000-memory.dmp
memory/1404-145-0x00000000080D0000-0x000000000874A000-memory.dmp
memory/1404-146-0x0000000007A70000-0x0000000007A8A000-memory.dmp
memory/1336-147-0x0000000000000000-mapping.dmp
memory/1336-148-0x0000000000400000-0x0000000000876000-memory.dmp
memory/1336-150-0x0000000000400000-0x0000000000876000-memory.dmp
memory/1336-151-0x0000000000400000-0x0000000000876000-memory.dmp
memory/4480-152-0x0000000000000000-mapping.dmp
memory/1092-153-0x0000000000000000-mapping.dmp
memory/4656-154-0x0000000000000000-mapping.dmp
memory/4144-155-0x0000000000000000-mapping.dmp
memory/4784-156-0x0000000000000000-mapping.dmp
memory/1336-157-0x0000000000400000-0x0000000000876000-memory.dmp
memory/1312-159-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-160-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-158-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-161-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-162-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1460-163-0x0000000000000000-mapping.dmp
memory/1312-164-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-166-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-165-0x00007FFE78230000-0x00007FFE78240000-memory.dmp
memory/1312-167-0x00007FFE78230000-0x00007FFE78240000-memory.dmp