Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-08-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230703-en
General
-
Target
Setup.exe
-
Size
120.1MB
-
MD5
5fb9b3c109ad471d0bc148329344e8ca
-
SHA1
21f2a06e7f83cb2886c16cafc20968f370fa2643
-
SHA256
c9ae7f8a79a27955d93c32f1b9fc3100496f4cdb6acfa848e80acabca6d1749f
-
SHA512
b50c9420e0709391be280b4f65be35bde9018388872c4ad675f104fd0093be22159a74b0d46b0d1c92043887824cb97464db452d422bcd339a1f3578b3f7456c
-
SSDEEP
1572864:uiM7DhczCaxWLABs8spKCFLme+A2akcvAYBkbKiD5DEeM9VCwQdUzk+:ulOCaELAO8WLiA2aTVkbKidc9IdUz/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 Setup.tmp -
Loads dropped DLL 1 IoCs
pid Process 1448 Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 Setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28 PID 1448 wrote to memory of 2888 1448 Setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\is-JTO17.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JTO17.tmp\Setup.tmp" /SL5="$80120,124988605,836608,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5d9bc11c23aa360311d6b237b23b0c4fd
SHA12f6bca0a9d09a1928f139a8a2e0cc872f4284fe7
SHA25688e4053e376c6597edc6533584b2f2fa3905237fe5db61867e8ee71c3a9e9f5d
SHA512732b217963e415fb272556731cf8503df431dbc450f6caf59b7c47804c650baebd33735d9fee18537bac37d639f4491a168351fa4b431457f62bae0e219de6fa
-
Filesize
2.5MB
MD5d9bc11c23aa360311d6b237b23b0c4fd
SHA12f6bca0a9d09a1928f139a8a2e0cc872f4284fe7
SHA25688e4053e376c6597edc6533584b2f2fa3905237fe5db61867e8ee71c3a9e9f5d
SHA512732b217963e415fb272556731cf8503df431dbc450f6caf59b7c47804c650baebd33735d9fee18537bac37d639f4491a168351fa4b431457f62bae0e219de6fa