Analysis
-
max time kernel
78s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
Resource
win10v2004-20230221-en
General
-
Target
free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe
-
Size
1.7MB
-
MD5
b01445231a203d761f6806350c6b4da7
-
SHA1
590d3af0e35d10659473c878e80894330ed23c45
-
SHA256
10f81c435c9a627bd1d8bc04fded50a723cd3afb59ddfd1441288c637fb0e7cc
-
SHA512
208c70364fbb5b958396149629f5d85bb02cf1bb47d5c047afb9569eac2bf3cac75e8a50b01636a069a213dde5b1843e6b8b846a73e4a9432a17c4fa35fd1779
-
SSDEEP
24576:A7FUDowAyrTVE3U5FmEj6CIFeuTxV/A/Tcr/OzuwibgRb+V8Wb:ABuZrEUR6C6euTxV/ALcr0uxzS
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\AVAST Software\Avast free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\AVG\AV\Dir free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Executes dropped EXE 1 IoCs
pid Process 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Loads dropped DLL 2 IoCs
pid Process 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4060 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4060 2744 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 84 PID 2744 wrote to memory of 4060 2744 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 84 PID 2744 wrote to memory of 4060 2744 free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\is-JC2HM.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp"C:\Users\Admin\AppData\Local\Temp\is-JC2HM.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp" /SL5="$B0058,879088,832512,C:\Users\Admin\AppData\Local\Temp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.exe"2⤵
- Checks for any installed AV software in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5096ff7dbb7f5dfb71cf40fcd37a59fd6
SHA15cc8f2256ae43e597edaf7841771d7471d8d0590
SHA2566197d9ad63a37760e88b7ee53077faf94d0deeb9d8740428d2dc76a7242d7843
SHA5128a37e62cdd1989443f1ac98c0e827cdbdd00f1a9d243e7b433ce1bf5dbdd05c8e1c7fdc07261086c18b6e39d2494c3b2acaac60a24bec84f4631f295efc4891d
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
2KB
MD588d3d0ef18fd80da1e888099691ec365
SHA1f2a3b683f0d72e66a69b71df1e2002fdba9aeb1f
SHA256395f730075cafa769b2397599c21bdd035f2ea6b1f4a39d0628e39f2c8ac4878
SHA5127728656d4d9b26e56b345396ef46f7f6b6fbc868fa21336864e23879241a1b1555f9a076d3acf9ab84fbec372a313fa5c5a78c93aa4d1ee8a62b8ef7a2db1186
-
Filesize
1KB
MD5a0f78df30ebc15bda8858e4c490a5eb1
SHA107140fdad7c7415fbb23461e243d7b576eb08749
SHA2560c679e463254ec4652917110ca1387fb3663d464e4bd792d97c2d853e156d900
SHA512f5539152f7faf5fa3505a2ebd1ccbe3145ee46564b814549a96b63f385a73b7e69176ca853d07adef386ea0cc7c0cea4989c74bd4334997b389d85a2f8db1508
-
C:\Users\Admin\AppData\Local\Temp\is-JC2HM.tmp\free-virtual-serial-ports-emulator-0.923.3.694-installer_VNha-r3.tmp
Filesize3.1MB
MD5c4630882db671a55924f100c5c1f0056
SHA124c08e7061301d9a3ef6b2fbbbbad484e5f4bc37
SHA25649cbceb57abe33bad7c5f8c56a8bc5ddd06507d185859554f1de31f3761741e3
SHA5126d044efc68d07317b298fa10ed6d68a6b36df6a31c57f32fc0e358ad2c039307dcec9a1755e3b2dac48efa6a9f31845aa0ae52d2b67e7daeb6ea503ec45257d6
-
Filesize
3.1MB
MD5aab8d91b5b0f8e64fd54810256de36bf
SHA11214930e8607c936369950e338e31656ee65bc41
SHA256168258e6769256a3db40e7feeaa8cc888fe2e3603788aba4c22f439a5b28e489
SHA512d7e9cfafffa13ec419a402d8d97271310f8a87318afbad19f2ad90a6f39e9b29c60f2c5f58eb011394fff13fc0f8dd951a507325c976368e8b8fe96954545a25