Analysis
-
max time kernel
249s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2023, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
SetupFile.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SetupFile.exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
SetupFile.exe
Resource
win10v2004-20221111-en
General
-
Target
SetupFile.exe
-
Size
762.9MB
-
MD5
6ee8aef895a4a94d745ad2d1464e316c
-
SHA1
cf6ae8cb821267875a5b7224e13a1ea3b43d87bb
-
SHA256
76f4b9e74057d1a8d59934479a69c601833f3e7151f70f576924a70228451c7c
-
SHA512
97c7d9fa7e64f487d29704a57dd9bfe2f4478a709ddf5e1eae412148250f2755436a0104fc9ea76d6f6d7dd02fd2c7d19e4693cde35f98b7727a471142eb8b55
-
SSDEEP
98304:tfE8eSY+aKtQGU+dbeIhDDL1l1eEdW+xy/UNRc9X6UI4lXq81rwQIaVMPauQPKCx:tfEhj+3U+x9Xl13W8ysNRc9r/pqUx
Malware Config
Extracted
raccoon
4859a564051819b0e0da9c36d0cc3ca2
http://94.142.138.3/
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5008 set thread context of 3352 5008 SetupFile.exe 83 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83 PID 5008 wrote to memory of 3352 5008 SetupFile.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SetupFile.exe"C:\Users\Admin\AppData\Local\Temp\SetupFile.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵PID:3352
-