Analysis
-
max time kernel
53s -
max time network
49s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
DriverEasy_Setup.exe
Resource
win10-20230915-en
General
-
Target
DriverEasy_Setup.exe
-
Size
5.2MB
-
MD5
acf113bdc4583a106696935f4eb019ee
-
SHA1
0aefa5323925bd97bce4ad1e5b604d5ba9e298f8
-
SHA256
538ccbe8745dc8fc45223275cf4e69f9a7085421db413b795b085400cde146f4
-
SHA512
3bc511dca2a2fc3bcd46d6f463a8ce5758e461c802be9e3dac84231174ae814a74b4c0a47bfe321c0a3ad3b6a08be91c9fa75aae56af64d82f701d44a4cbdf43
-
SSDEEP
98304:mkLr0aoU84dsrPvhD5zsevxSS3tYHPeeT/r+v1zb7:RI54+hlzp9EVivNb7
Malware Config
Signatures
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files\Easeware\DriverEasy\Easeware.Driver.Backup.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\Easeware.ConfigLanguageFromSetup.exe DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\Interop.WUApiLib.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\7z\7z86.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\Easeware.Driver.Core.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\7z\7z.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\HardwareInfo\HardwareInfo.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\HardwareInfo\HardwareInfo64.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\DriverEasy.exe DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\SevenZipSharp.dll DriverEasy_Setup.tmp File opened for modification C:\Program Files\Easeware\DriverEasy\Easeware.CheckScheduledScan.exe DriverEasy_Setup.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri Taskmgr.exe -
Executes dropped EXE 1 IoCs
pid Process 3624 DriverEasy_Setup.tmp -
Loads dropped DLL 5 IoCs
pid Process 3624 DriverEasy_Setup.tmp 3624 DriverEasy_Setup.tmp 3624 DriverEasy_Setup.tmp 3624 DriverEasy_Setup.tmp 3624 DriverEasy_Setup.tmp -
Program crash 2 IoCs
pid pid_target Process procid_target 2032 3624 WerFault.exe 70 4064 3624 WerFault.exe 70 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3624 DriverEasy_Setup.tmp 3624 DriverEasy_Setup.tmp 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3684 Taskmgr.exe Token: SeSystemProfilePrivilege 3684 Taskmgr.exe Token: SeCreateGlobalPrivilege 3684 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe 3684 Taskmgr.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3624 1232 DriverEasy_Setup.exe 70 PID 1232 wrote to memory of 3624 1232 DriverEasy_Setup.exe 70 PID 1232 wrote to memory of 3624 1232 DriverEasy_Setup.exe 70 PID 820 wrote to memory of 3684 820 launchtm.exe 72 PID 820 wrote to memory of 3684 820 launchtm.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriverEasy_Setup.exe"C:\Users\Admin\AppData\Local\Temp\DriverEasy_Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\is-76A6S.tmp\DriverEasy_Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-76A6S.tmp\DriverEasy_Setup.tmp" /SL5="$5022A,4429772,1057792,C:\Users\Admin\AppData\Local\Temp\DriverEasy_Setup.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 1243⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 1243⤵
- Program crash
PID:4064
-
-
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3684
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5945fcb7a7fd86c96a36bec419f528d1f
SHA1aa85b0080c1960d6d6fe42aeb455fc8841fcd55d
SHA256c9d52631073331262504a87c2d8f10be1f56d45f8ce837c886970d0f706a287c
SHA512f042340b1dd05377de9bd7673657cc3a920085e740f3fd1f673baeaf097a6cacd63918269837b01d6b3cb2ae8b9dd59134369b8b1ecbe4b959886ff84b6234aa
-
Filesize
3.2MB
MD5945fcb7a7fd86c96a36bec419f528d1f
SHA1aa85b0080c1960d6d6fe42aeb455fc8841fcd55d
SHA256c9d52631073331262504a87c2d8f10be1f56d45f8ce837c886970d0f706a287c
SHA512f042340b1dd05377de9bd7673657cc3a920085e740f3fd1f673baeaf097a6cacd63918269837b01d6b3cb2ae8b9dd59134369b8b1ecbe4b959886ff84b6234aa
-
Filesize
21KB
MD501acdcceac1f70fdd485fe5f634d38fd
SHA159797b45a0fa77ae84d38744b274a41aff49fec9
SHA25629cc4235d79581dc85bce06183738f4562c4f9e5e35ce3f1c55366fcfc25d38b
SHA512364b533b98ef7825f86939f36878d1615647b1480e8320cecbeb9ef629a5668df8629dcfc89d56cfcbe8e7840791015551a112c9a906142372e6178088c8ab8a
-
Filesize
1KB
MD51549ea2cf00358fb791db13bcb773501
SHA1ed199cb343304bfc7116ce4755d6f7ff7b6304d1
SHA256d9cd2cee2f362d1388513d5da6031259ff9ce97e0f13a992c50077e8eaf33e54
SHA512a2892c12f5eaccc4216e8aa5a5a88f3a0ebdcebb142f145e218c5d94697e127eba613d2bafdc82700064714035df9a8420cabceddb65ea4ad6cde339c5af0a79
-
Filesize
10KB
MD5f048154d9062a3c2f147b6380ce6f3ac
SHA15abfa577139f41e7f28769f98304b878ad3df696
SHA2561d537619ea6508a383387d88e523522436e86dc72b929680e1552b10e44cf0f6
SHA5124875070a599a2afc5d8f6f4b0803397e1fc425807af90d377270b857da5631a78c9a61442572229c63891b7a5ecd96dcd8fc06329988dc6a97eec7db926e3e66
-
Filesize
14KB
MD5a14d38bcad591c0f1a3cf9f5f77e3000
SHA1268665e61ff92a50f8060cb09fc1e1baa9dd16ad
SHA2561642d5ba407ad652fae4a4d10a00fc1c0728d94a6ef75a8d0901a2b315f1677e
SHA512e7527dab0a030bf9913528f7e7261e2be03bbcb6342b61e69d16b3ae1fcbec8e53f376ae9e4866aff6efae840f1578549e4034df852a260d7530583449a5598e
-
Filesize
70KB
MD5447126e21ba415d65a71e514987d08ed
SHA13c88bcd409acc7a239159cd658df50c79bdfddf1
SHA2561d0bc1f1d4ac68ecd6420a3031803620d5bfcb71dec93ad4f74e4cd1ee1be6c3
SHA51282cf2b1299cb85b88970111464f6cd2572e5cb4518aaa894bb5189e45616cd8cdce3fd260deaaa6b71f2a570883d09fb7cc4268d3116dde96b10f100a74244f0
-
Filesize
2KB
MD5c7c746fcc5542d734a3860b425ac6a1e
SHA1fbec196d3b5b64ef14e10f6583c51206436f46cb
SHA2567cdac82567cdd9719a83bcb62c098c6d2b19d115f10e3db2b164b5f3b0ed1f89
SHA512e541b97fa6a6044ee95dde3b6f2d6232c4f1bf96c490eacce9be76eebdd760eacdb1b36fd4b720ca206a5e9ddea0870e0eae7b514f0edfdf0fdd80c594b677b6
-
Filesize
1KB
MD55f6a7af5eca52aa134a4a06832a5d005
SHA125ad7d62392ac4007e1ed1139e319edd14597f62
SHA2567d9ef408ad2520d62d4389c957e105d3fabf14697d2846b77e4fc488fbb84535
SHA5124001faa3b99fb852991106846889bf6e16b50c2977e6cf7749a89f1925f0e70f9265688dcb10376ed77d07a816f80e6484273877ad726ed046ca1c49a4e71ce1
-
Filesize
1KB
MD50327da652758a468b4a782e3392eb72b
SHA158fda11c77fd75c42142cbaf5a33c22d984da76d
SHA256a1c151e746184ba06e9ff178b4134fc8763f64a53d017486cbfb5b2a9af36ca0
SHA51207a3f282e64e4aa163052242747e10a0b3c0aeb8c70077840c6a00c3149025a95d0a4a21b43dfb546e274aa8354d71d3451e199fa7a8b35b7be3e9da714e4fd8
-
Filesize
5KB
MD5b9e4b8247138afe12ae2157b20628de9
SHA17814f463723eea931c4c139bf6bb01bd0349d0c8
SHA2567877a7839c12c635271f4f03b980f80cb2cdd19b9c660e706edac85f2ca50022
SHA5127a612b1dc28fccdc8c47d0f68afa530dfccaa5c657a109cf1927ec983b6090bc3ddab8fed0826dbf4f5319d84fa4b2ba70714c9bd3027272d7dc334f3e3e4e5f
-
Filesize
2KB
MD5b66aff516f0d0b51ac1330ad38f0da68
SHA13c7454547eb33669609f91716ae4cee0e4fbbb9b
SHA256e76216c1183152853638f804170efebe8d061d11c30ea9bf9e6ed1a9fcc6afed
SHA512b1ec90c4a69bc45fa59eeb27adc8ce168209fdf1653fbafee5775e76719c5a170e9eea1cefbd70837cc518d0ce86078a43a12dfa415514c0d96ff462dd670435
-
Filesize
3KB
MD51df20e390976ad57765f1449e07cfd72
SHA1065e56256389918977f6fafb08dcc700572b9667
SHA2567a07b728ebede2cf1b4e81a50b7f5f9beae0975d4909c889e0d650472016663b
SHA51224465bd65a39c3631a2c4b8709fbb09b279bc21d2056cc21bec4253787ff5a60662b5869b0e912ed529f280745b0436f9b76ae0370625dc41aff03995d9a5b1c
-
Filesize
1KB
MD539ab68a67302e28f0ae08ec418890d2e
SHA1f3499299e54d05fff2ff8b888a1aacefa8f4e5fc
SHA256a22aa447e1f620098e969d56688e79cc4b3b729afe83a13468e86cd2927545df
SHA512efe3bbb6769bc9a694b994303bc56f566b2b532f31cc067d137df972d332c18541513327440f914671ec1253b3d0827ac6a3be1eb5c81f921ffe128587ecff39
-
Filesize
1KB
MD55a7f3314fbd8a3db765394798bc8a9ce
SHA12b48d22c07be26ac653e5ed30b8e816f96914345
SHA2562f67d842567176b42176784bb001ec63e3d84685fa35aebe5c23db20a969d427
SHA512d371ba564494c05d5fda955b1c6665473637b6d7bc0fe8c26ca57ec2133cc9664dab2bb4a5cdb02b2886ac94d64629f7af2edcbb7362ef4aedd53956ed31f824
-
Filesize
271B
MD58590e035e72584ca56eba6a9dfb23a33
SHA1ed65e65a189b1f1e1e8e2322989742c27cd66c0c
SHA256c5267ffea02e06c538c8be10b1b83513830d6390a069761d10a4b67d9e684f0b
SHA512ac15c3f675766d3c4b70b4a49138e610873bf10086f83277ba88ca4b8b5f8de6eeea74957c82c63d92b662f19c72673bf397c789d4571db725c6de14b60047e8
-
Filesize
396B
MD51432db7bb8b975c28f110a373d9efe94
SHA12012c2f48f43c1a784536fedc5489a65a839012a
SHA256add59e97c665f0b2e91ed46a9e229320ca3b99f64fc09a54fd5456a8d906f82a
SHA512330be9944f137fc950111092beefa64a2e5c2a14278dce6d077c07ffd403723b08015ebafcbba96c7afaccd4e66029549536a5327b5d9f789b644a1083bd4f9d
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
121KB
MD548ad1a1c893ce7bf456277a0a085ed01
SHA1803997ef17eedf50969115c529a2bf8de585dc91
SHA256b0cc4697b2fd1b4163fddca2050fc62a9e7d221864f1bd11e739144c90b685b3
SHA5127c9e7fe9f00c62cccb5921cb55ba0dd96a0077ad52962473c1e79cda1fd9aa101129637043955703121443e1f8b6b2860cd4dfdb71052b20a322e05deed101a4