Resubmissions
14-03-2023 22:51
230314-2s199sac83 1014-03-2023 22:49
230314-2rmqgscb41 114-03-2023 22:41
230314-2mav5aac48 1Analysis
-
max time kernel
301s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
14-03-2023 22:51
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-es
General
-
Target
Setup.exe
-
Size
79.8MB
-
MD5
5f7f2d3361425087280490710a9d5aa9
-
SHA1
ef6eb5190636a0318ca6ffd0267448bfaf1bdaa0
-
SHA256
5e21723dd4e0cb7f75642346e60f24fe86263f1683de03ab1aa249576272d73e
-
SHA512
955cdbf246a4d0fd5303d337bb11ed5e7730a75c9bb6d4c3cc69132303a94de7530b46bb8285881309066ed0b1ba09ff2192ec7f930e175d37eeff11e4cedf00
-
SSDEEP
1572864:U9ouwWq+Za9KspIAhes2OU8wSpEvmggyPuBrJ5+ZGDZ2mptWeAJI2a:U9KlHs1keN8e+gd8L+ZIZ2mXmJI2a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Setup.tmppid process 3032 Setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Setup.exedescription pid process target process PID 3348 wrote to memory of 3032 3348 Setup.exe Setup.tmp PID 3348 wrote to memory of 3032 3348 Setup.exe Setup.tmp PID 3348 wrote to memory of 3032 3348 Setup.exe Setup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-HSHRB.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-HSHRB.tmp\Setup.tmp" /SL5="$80046,82709273,888832,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-HSHRB.tmp\Setup.tmpFilesize
3.1MB
MD5eb66ac34b88e5b6dc4714ba010455c01
SHA11274dfe6a6e635eac02941618a663e2cb85b2d9a
SHA256dfe011bf9dff78f8c1052f33bd1e4b4a856333bac13aed7d9e40589dd5f69698
SHA5129f5c01f580a40c9745dd2cd44f894eba1b1e3179d5eb2f89db0687ad3e467ba70a295414fb691843f8206ce5ceddca6d73596d0b81ea656f43371c16c4f628d1
-
memory/3032-138-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/3032-140-0x0000000000400000-0x0000000000720000-memory.dmpFilesize
3.1MB
-
memory/3032-141-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/3348-133-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/3348-139-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB