Analysis
-
max time kernel
151s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 02:49
Static task
static1
Behavioral task
behavioral1
Sample
PC-Set-UP_SOFT.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PC-Set-UP_SOFT.exe
Resource
win10v2004-20230220-en
General
-
Target
PC-Set-UP_SOFT.exe
-
Size
9.7MB
-
MD5
bf7a18436887c2ba24ae483096365f35
-
SHA1
01ff678f52d94a278ee5e14164eb7b9599675ed6
-
SHA256
e1c98a0ade9b2f076c17c90bf42bafe1814fdbce24eb85cc401a72c1e1cfa601
-
SHA512
d498f9bcdaf8389535f7ef16cfb73acc4d12b0f37b1afae49d5d8f731d147d19808d59fe010fe7195479987cd4a13461a5180aacc77364bff5da9e5f01dcc128
-
SSDEEP
196608:RljSlVLHRCRaAKd6MYhMMy6oqX4w7rDdYuXCM4+e:PGvXZdyK4ny4CM4R
Malware Config
Extracted
raccoon
f49765d62e02586d0fe162b5d3a934ad
http://5.75.159.229/
http://212.113.119.153/
http://78.153.130.123/
http://212.113.119.35/
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1540 8BZvqjck.exe 2028 i92z18rG.exe 1928 0KlK56gC.exe 1072 Kr27sg7Q.exe -
Loads dropped DLL 12 IoCs
pid Process 1264 PC-Set-UP_SOFT.exe 1264 PC-Set-UP_SOFT.exe 1264 PC-Set-UP_SOFT.exe 1264 PC-Set-UP_SOFT.exe 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe 1264 PC-Set-UP_SOFT.exe 1364 WerFault.exe 1264 PC-Set-UP_SOFT.exe 1264 PC-Set-UP_SOFT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1540 set thread context of 1152 1540 8BZvqjck.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1364 1540 WerFault.exe 30 1112 1152 WerFault.exe 32 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 PC-Set-UP_SOFT.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde PC-Set-UP_SOFT.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1264 PC-Set-UP_SOFT.exe 1928 0KlK56gC.exe 1072 Kr27sg7Q.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1540 1264 PC-Set-UP_SOFT.exe 30 PID 1264 wrote to memory of 1540 1264 PC-Set-UP_SOFT.exe 30 PID 1264 wrote to memory of 1540 1264 PC-Set-UP_SOFT.exe 30 PID 1264 wrote to memory of 1540 1264 PC-Set-UP_SOFT.exe 30 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1152 1540 8BZvqjck.exe 32 PID 1540 wrote to memory of 1364 1540 8BZvqjck.exe 33 PID 1540 wrote to memory of 1364 1540 8BZvqjck.exe 33 PID 1540 wrote to memory of 1364 1540 8BZvqjck.exe 33 PID 1540 wrote to memory of 1364 1540 8BZvqjck.exe 33 PID 1264 wrote to memory of 2028 1264 PC-Set-UP_SOFT.exe 34 PID 1264 wrote to memory of 2028 1264 PC-Set-UP_SOFT.exe 34 PID 1264 wrote to memory of 2028 1264 PC-Set-UP_SOFT.exe 34 PID 1264 wrote to memory of 2028 1264 PC-Set-UP_SOFT.exe 34 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1152 wrote to memory of 1112 1152 AppLaunch.exe 35 PID 1264 wrote to memory of 1928 1264 PC-Set-UP_SOFT.exe 36 PID 1264 wrote to memory of 1928 1264 PC-Set-UP_SOFT.exe 36 PID 1264 wrote to memory of 1928 1264 PC-Set-UP_SOFT.exe 36 PID 1264 wrote to memory of 1928 1264 PC-Set-UP_SOFT.exe 36 PID 1264 wrote to memory of 1072 1264 PC-Set-UP_SOFT.exe 37 PID 1264 wrote to memory of 1072 1264 PC-Set-UP_SOFT.exe 37 PID 1264 wrote to memory of 1072 1264 PC-Set-UP_SOFT.exe 37 PID 1264 wrote to memory of 1072 1264 PC-Set-UP_SOFT.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\PC-Set-UP_SOFT.exe"C:\Users\Admin\AppData\Local\Temp\PC-Set-UP_SOFT.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\LocalLow\8BZvqjck.exe"C:\Users\Admin\AppData\LocalLow\8BZvqjck.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 6884⤵
- Program crash
PID:1112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 363⤵
- Loads dropped DLL
- Program crash
PID:1364
-
-
-
C:\Users\Admin\AppData\Roaming\i92z18rG.exe"C:\Users\Admin\AppData\Roaming\i92z18rG.exe"2⤵
- Executes dropped EXE
PID:2028
-
-
C:\Users\Admin\AppData\Roaming\0KlK56gC.exe"C:\Users\Admin\AppData\Roaming\0KlK56gC.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe"C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
5.8MB
MD5e7a69210f26c7944b6e267d0d73af320
SHA1cc03fe693690e4f45a7cca31782292f69e505801
SHA25664b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
SHA51244345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
Filesize
5.8MB
MD5e7a69210f26c7944b6e267d0d73af320
SHA1cc03fe693690e4f45a7cca31782292f69e505801
SHA25664b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
SHA51244345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
Filesize
168.7MB
MD55b0a98110d8c16c6e0cb19fea378d9ef
SHA19cb6d7f624cff3cba83efce421fa6201f98fa748
SHA2566a71465bf2a1ab99cd2f5e32955122100be1f13998b920e0cdd130dd8ff90cce
SHA512bfa7adf6c639a0de5d95f358f4c7b875ac26429a0a69f2036a5f59bdf61db6524b5e68cb86db41c7ef594572a92f23d5b2dda48ffa235cfca046d8f674d55eae
-
Filesize
134.7MB
MD58729fd0901f3a21e6f1a635f4cd0b9a1
SHA110a55e4bdfd5daee4e67c6811e3c2ff4827560aa
SHA25657d66c9163dffae6f328a8c8dedcd8dde9ea18ba49b257b9539ebde874a2caa8
SHA51296b02462acde3e5612d3e7a4112145b3c1cea2039cc7721a23cb1b41587ecd26613d7774c4f4ab69b6492bc6e6c0cac900ef4c9212e4de71efaccae51a72b0dc
-
Filesize
151.7MB
MD50fc851e934db29a734e781f1f2163962
SHA1b44fbc30fab9966ca33791d275bb66a846c93f8b
SHA2567cbc5fb93027d3f7a0ee0e4b7c7886859be713a8212d3be8dd6935e0695802de
SHA5120d4f9d22de2b3102c576d7f3ef874f9002d97179e5f703fb2db80b90a3e953a6c43114f3037d0fd8b8ae73133e4efcba96320c004b75613cb4e6591f65bd4908
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
251KB
MD526b02242e05cbfab57cec7654da6d5bb
SHA1fa160aedb2ceef7af75e52e9f37b6878f5c011c5
SHA256a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556
SHA5121a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
5.8MB
MD5e7a69210f26c7944b6e267d0d73af320
SHA1cc03fe693690e4f45a7cca31782292f69e505801
SHA25664b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2
SHA51244345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07
-
Filesize
169.5MB
MD53f6297678a67c3e4b584e87d23ff973c
SHA16e43b2b1d31f0b70edaf8f4d2379fecad8434288
SHA25661708025d919ef7293097f64cd9d4042f3e691579281e0f2e1c1457658f6a74e
SHA512c9b46ef932dea515fb4144aa94db5f1e97da6daf828d52d457850b5efe975d01fa7f378e11338c210ce8b0412a075aa4f86cf1161b91cd4e912404d6ebf1cd8c
-
Filesize
52KB
MD513e943e4a218b36c30fcc7fe865d5d93
SHA19fb188959cc18b754db75a50240973abe05d1635
SHA2563fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4
SHA512c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f