Overview
overview
7Static
static
1infinst.exe
windows10-1703-x64
4infinst.exe
windows10-2004-x64
4x3daudio1_1.dll
windows10-1703-x64
1x3daudio1_1.dll
windows10-2004-x64
3xactengine2_7.dll
windows10-1703-x64
7xactengine2_7.dll
windows10-2004-x64
7AutoPlay/D...UP.dll
windows10-1703-x64
4AutoPlay/D...UP.dll
windows10-2004-x64
4AutoPlay/D...UP.exe
windows10-1703-x64
4AutoPlay/D...UP.exe
windows10-2004-x64
4AutoPlay/D...S.pptx
windows10-1703-x64
1AutoPlay/D...S.pptx
windows10-2004-x64
1AutoPlay/D...er.exe
windows10-1703-x64
7AutoPlay/D...er.exe
windows10-2004-x64
7AutoPlay/D...32.dll
windows10-1703-x64
4AutoPlay/D...32.dll
windows10-2004-x64
4AutoPlay/D...up.exe
windows10-1703-x64
7AutoPlay/D...up.exe
windows10-2004-x64
7autorun.exe
windows10-1703-x64
3autorun.exe
windows10-2004-x64
3lua5.1.dll
windows10-1703-x64
3lua5.1.dll
windows10-2004-x64
3lua51.dll
windows10-1703-x64
3lua51.dll
windows10-2004-x64
3Analysis
-
max time kernel
1534s -
max time network
1593s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
15-02-2023 04:45
Static task
static1
Behavioral task
behavioral1
Sample
infinst.exe
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
infinst.exe
Resource
win10v2004-20220812-es
Behavioral task
behavioral3
Sample
x3daudio1_1.dll
Resource
win10-20220901-es
Behavioral task
behavioral4
Sample
x3daudio1_1.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral5
Sample
xactengine2_7.dll
Resource
win10-20220812-es
Behavioral task
behavioral6
Sample
xactengine2_7.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral7
Sample
AutoPlay/Docs/DSETUP.dll
Resource
win10-20220812-es
Behavioral task
behavioral8
Sample
AutoPlay/Docs/DSETUP.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral9
Sample
AutoPlay/Docs/DXSETUP.exe
Resource
win10-20220901-es
Behavioral task
behavioral10
Sample
AutoPlay/Docs/DXSETUP.exe
Resource
win10v2004-20220812-es
Behavioral task
behavioral11
Sample
AutoPlay/Docs/DirectX_11_Technology_Update_US.pptx
Resource
win10-20220812-es
Behavioral task
behavioral12
Sample
AutoPlay/Docs/DirectX_11_Technology_Update_US.pptx
Resource
win10v2004-20221111-es
Behavioral task
behavioral13
Sample
AutoPlay/Docs/VC_RedistInstaller.exe
Resource
win10-20220901-es
Behavioral task
behavioral14
Sample
AutoPlay/Docs/VC_RedistInstaller.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral15
Sample
AutoPlay/Docs/dsetup32.dll
Resource
win10-20220812-es
Behavioral task
behavioral16
Sample
AutoPlay/Docs/dsetup32.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral17
Sample
AutoPlay/Docs/setup.exe
Resource
win10-20220812-es
Behavioral task
behavioral18
Sample
AutoPlay/Docs/setup.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral19
Sample
autorun.exe
Resource
win10-20220812-es
Behavioral task
behavioral20
Sample
autorun.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral21
Sample
lua5.1.dll
Resource
win10-20220901-es
Behavioral task
behavioral22
Sample
lua5.1.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral23
Sample
lua51.dll
Resource
win10-20220812-es
Behavioral task
behavioral24
Sample
lua51.dll
Resource
win10v2004-20220812-es
General
-
Target
AutoPlay/Docs/setup.exe
-
Size
711KB
-
MD5
a4318d6bde23314f8dc6c28688cf1396
-
SHA1
2b4ad23828c7b7affee4b3d287c4df781531f728
-
SHA256
21e3837855917e831e262ceee2dd7728bcb595e9a625f98056fa9782d00bf9dd
-
SHA512
3f98214c53fa4d8d73a60ded0dc481e5b420391b10d832c6302a487356c3fc52e69a6f7f125c485dcf8b5ef760c92949e22619551481628a05507a17c460aadd
-
SSDEEP
12288:iQiGXtG128pzy9AHCcsxiy/MZ4HzKDNvOvb+SYEhrVK57r9nSd5YjNPjalQZ:iQi6G12CziznhmRDVOvbTLrK5lAYTZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4376 setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4376 1600 setup.exe 80 PID 1600 wrote to memory of 4376 1600 setup.exe 80 PID 1600 wrote to memory of 4376 1600 setup.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoPlay\Docs\setup.exe"C:\Users\Admin\AppData\Local\Temp\AutoPlay\Docs\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\is-8RQR0.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8RQR0.tmp\setup.tmp" /SL5="$90054,131584,0,C:\Users\Admin\AppData\Local\Temp\AutoPlay\Docs\setup.exe"2⤵
- Executes dropped EXE
PID:4376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD54c194c4d71d4bd4e9b6a46a5062f94c5
SHA15c164db67fb3d3a7277567a66910a51eaeafc991
SHA2560f5068b9615f40f119fdbf5f35c06c05f5907ba7500964ddf07ee3def9df8fa1
SHA51283d4121005a64583bddb366bf5c494ecf0a3c882391432c9e28ffcaa95ed2131adf05c7749c578fa71852d82689f90a52a9ce44ce738e606b461239fd95cdaa5
-
Filesize
763KB
MD54c194c4d71d4bd4e9b6a46a5062f94c5
SHA15c164db67fb3d3a7277567a66910a51eaeafc991
SHA2560f5068b9615f40f119fdbf5f35c06c05f5907ba7500964ddf07ee3def9df8fa1
SHA51283d4121005a64583bddb366bf5c494ecf0a3c882391432c9e28ffcaa95ed2131adf05c7749c578fa71852d82689f90a52a9ce44ce738e606b461239fd95cdaa5