Analysis
-
max time kernel
553s -
max time network
554s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/09/2023, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win7-20230831-en
General
-
Target
Setup.exe
-
Size
224KB
-
MD5
f79f52b0bfe45c9639a0228a30e1f7ad
-
SHA1
f4566cf5db3ee3fd8d61413b4366e0f01531c1b3
-
SHA256
3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795
-
SHA512
4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0
-
SSDEEP
3072:yKsgyqI/cLLjGK0w7BSvwS24YGnFYYLd12rABAQnW49AMADn/Yh:V5Gw7EvwkXnFYC2r4dW49
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2716 netsh.exe 660 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76e9fe4e3aaf999d0000ff4d09fc67e7.exe aDbjYi97m19.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76e9fe4e3aaf999d0000ff4d09fc67e7.exe aDbjYi97m19.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 aDbjYi97m19.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 Setup.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
resource yara_rule behavioral2/memory/2112-687-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-683-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-681-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-689-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-692-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-691-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/2112-693-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/1680-707-0x0000000000400000-0x0000000000472000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\76e9fe4e3aaf999d0000ff4d09fc67e7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aDbjYi97m19.exe\" .." aDbjYi97m19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\76e9fe4e3aaf999d0000ff4d09fc67e7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aDbjYi97m19.exe\" .." aDbjYi97m19.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2096 set thread context of 2112 2096 aDbjYi97m19.exe 39 PID 2096 set thread context of 1680 2096 aDbjYi97m19.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Control Panel\Appearance\Schemes rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 820 PING.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 1100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1100 AUDIODG.EXE Token: 33 1100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1100 AUDIODG.EXE Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe Token: SeIncBasePriorityPrivilege 2096 aDbjYi97m19.exe Token: 33 2096 aDbjYi97m19.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2932 wrote to memory of 2096 2932 Setup.exe 28 PID 2096 wrote to memory of 2716 2096 aDbjYi97m19.exe 29 PID 2096 wrote to memory of 2716 2096 aDbjYi97m19.exe 29 PID 2096 wrote to memory of 2716 2096 aDbjYi97m19.exe 29 PID 2096 wrote to memory of 2716 2096 aDbjYi97m19.exe 29 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 1620 2096 aDbjYi97m19.exe 34 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 2112 2096 aDbjYi97m19.exe 39 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 1680 2096 aDbjYi97m19.exe 41 PID 2096 wrote to memory of 660 2096 aDbjYi97m19.exe 43 PID 2096 wrote to memory of 660 2096 aDbjYi97m19.exe 43 PID 2096 wrote to memory of 660 2096 aDbjYi97m19.exe 43 PID 2096 wrote to memory of 660 2096 aDbjYi97m19.exe 43 PID 2096 wrote to memory of 1168 2096 aDbjYi97m19.exe 45 PID 2096 wrote to memory of 1168 2096 aDbjYi97m19.exe 45 PID 2096 wrote to memory of 1168 2096 aDbjYi97m19.exe 45 PID 2096 wrote to memory of 1168 2096 aDbjYi97m19.exe 45 PID 1168 wrote to memory of 820 1168 cmd.exe 47 PID 1168 wrote to memory of 820 1168 cmd.exe 47 PID 1168 wrote to memory of 820 1168 cmd.exe 47 PID 1168 wrote to memory of 820 1168 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe" "aDbjYi97m19.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2716
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\system32\desk.cpl desk,@Themes /Action:OpenTheme /file:"C:\Windows\Resources\Themes\aero.theme"3⤵
- Modifies Control Panel
PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\4483425"3⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\4984827"3⤵PID:1680
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"3⤵
- Modifies Windows Firewall
PID:660
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 24⤵
- Runs ping.exe
PID:820
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2664
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5201⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5020570a88c0692f7f3d1d42379058765
SHA1bef5e581e4c7ef4f171c165911145dca9c68287e
SHA25616efc91532dc5d3d151ce5bdb882e6831d562a54bf8592c31052159ce929cddb
SHA5121f47d19f8f2dc77e7ab9fa12b096bb41600f84b67cc22fd41886b9a759c32c3565db23a1dfe039a1d376ffe7d510b3603f0acc5df14886d254235329e074ef9e
-
Filesize
1KB
MD505471356f0ea1c0f5f5b8deb29c3ebd1
SHA112b14b737d1e0f76ca2494fb7a6841e5792a0504
SHA256cf59479c75a8803468dd2a2c1d2803a2694c41992d5a0b3b65b1c69c28d1eac7
SHA512942285259612792c2b3a45a65483e0775314841e397e815d447fd8f69f63f5de1ac48653a051c0121bd73415655c468772d39ce72bb1ba3d8ae367f78143502b
-
Filesize
1KB
MD529e0e345438882a935d2c0baff457f6c
SHA1aef4d88c8c81bc9d9440e1f94f792f6ab83e2b5a
SHA2560c127592f7670047d0b1928fede6ecf7c827b9e8086500b23756e5c02d09a4c6
SHA5128b87df27f7edc9328debeb3a0f68468d1d46615122e815d03330a9682776f85a47ef37889fc210fb28e56d91bf8cf0f0e594f90c3eaff5827dfd57b97a0b359b
-
Filesize
1KB
MD5159bd6a587f370f16522b2a6f690bcc3
SHA1c07d14fc439997e2f65b982c0702a985b36b9cf8
SHA2569193c9b28f4e19c5fbd00340dce578825fbc6ce6ab67b1c9082c0d8f64446993
SHA512a1ddc058193d778b3935ef8f158bb06f014de72124d5561a4d7af99e77921bcfe5ffcb24a1375917d5e438e0f2a1dccb96c1bdc2fa5b6aaf75ca5cabe1788e46
-
Filesize
1KB
MD57c048eaacd1820ac933dccc0b872fa05
SHA1955999eb7463f7e4031d551e24fbd1e1fb812197
SHA256614d7a9ca519b3aa741a512e95f6f99aedd25e8c1630d30d13dd9735b562b3be
SHA51209f35a1a69344e64b13f0a54ecc82cd7dd1ee9124bfc274fcd5fe8af2a07e30bbf0841d9230591cbbe12bc8f066f5f36e1577b82d5d1f3f0eb6b9b5154ce5d4b
-
Filesize
1KB
MD5b65aeb1b3da0b96313cc6e10dde4afe0
SHA134039989280d6d5a45793deaab79665c79b74b8d
SHA2560254d776e25aeb83f195aacc7d477cd37683932586b27fdb7f09836d08296a3c
SHA512be5c22848ee3491061feaab9c8e708e04e5d34bc0d8b46e816e059e6616c0114cfe5f40aee935f9d5dee546a990efa3bca00bdec03bcc29fedad37d0dbda95ea
-
Filesize
224KB
MD5f79f52b0bfe45c9639a0228a30e1f7ad
SHA1f4566cf5db3ee3fd8d61413b4366e0f01531c1b3
SHA2563b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795
SHA5124f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0
-
Filesize
224KB
MD5f79f52b0bfe45c9639a0228a30e1f7ad
SHA1f4566cf5db3ee3fd8d61413b4366e0f01531c1b3
SHA2563b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795
SHA5124f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76e9fe4e3aaf999d0000ff4d09fc67e7.exe
Filesize224KB
MD5f79f52b0bfe45c9639a0228a30e1f7ad
SHA1f4566cf5db3ee3fd8d61413b4366e0f01531c1b3
SHA2563b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795
SHA5124f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0
-
Filesize
224KB
MD5f79f52b0bfe45c9639a0228a30e1f7ad
SHA1f4566cf5db3ee3fd8d61413b4366e0f01531c1b3
SHA2563b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795
SHA5124f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0