Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Roshade.Setup.3.3.1.exe.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Roshade.Setup.3.3.1.exe.zip
Resource
win10v2004-20230824-en
Behavioral task
behavioral3
Sample
Roshade.Setup.3.3.1.exe - Archive.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Roshade.Setup.3.3.1.exe - Archive.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
changelog/img/wEeX0rJ2d4BmbnsGFriBreEzhkMLsTj8.png
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
changelog/img/wEeX0rJ2d4BmbnsGFriBreEzhkMLsTj8.png
Resource
win10v2004-20230703-en
Errors
General
-
Target
Roshade.Setup.3.3.1.exe - Archive.exe
-
Size
781KB
-
MD5
34b3d82fe220ad1b6a93a68c903f9b86
-
SHA1
c0b085af680a927e8c8bba8400904fc37c9b681e
-
SHA256
6bc198921d872252f6e3b2c088f59c2c38460886b8438780d76d2453a97b4008
-
SHA512
edf8749d04dce834a7f4aa57910462a2706932170cde091fbac8eeaf3e42da6b94c67e314dc532f37450e663fd8200933bd8e315e525ab21092251544f979207
-
SSDEEP
24576:oY0d/kaCUc9Fd89fgOfzScpL4Jfo3W04G:zWkaCUIFd89fgOfzScpL4W3W04G
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1640 created 1280 1640 Roshade.Setup.3.3.1.exe - Archive.exe 14 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Update\fyKW2XVRgIImRthkP39sjXjcJ628DxiU.png Roshade.Setup.3.3.1.exe - Archive.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1640 Roshade.Setup.3.3.1.exe - Archive.exe 1640 Roshade.Setup.3.3.1.exe - Archive.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe - Archive.exe"C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe - Archive.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
PID:2884
-