Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe
Resource
win10v2004-20231020-en
General
-
Target
9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe
-
Size
83.4MB
-
MD5
02cc214e55afe8ffeda663a417509324
-
SHA1
1d406103f7d638dd3c0491670b495ed84efcbb74
-
SHA256
9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b
-
SHA512
363d7c50120a4fa96ea347a0cd47f638b8d55a40c14c0d8f7152bc1f0d8807cec5288f79db6d15928614eb3c733ce94a558940f06b223c785db812f57c4d6458
-
SSDEEP
1572864:KgTwTuS+YBem/SSte6JUgdjlROqNnVyizOAkR5TwoDTTwoDAB:KgTwT1+bzS7jTOMR6YoDQoDW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SRLicenseManager_Setup.exe -
Executes dropped EXE 6 IoCs
pid Process 4724 irsetup.exe 5000 SRLicenseManager_Setup.exe 2056 irsetup.exe 1968 SetACL.exe 1600 SRLicenseManager.exe 1616 SRLicenseManager.exe -
Loads dropped DLL 2 IoCs
pid Process 4724 irsetup.exe 2056 irsetup.exe -
resource yara_rule behavioral2/files/0x0006000000022e50-5.dat upx behavioral2/files/0x0006000000022e50-10.dat upx behavioral2/files/0x0006000000022e50-11.dat upx behavioral2/memory/4724-14-0x0000000000410000-0x00000000007F7000-memory.dmp upx behavioral2/files/0x0007000000022d43-44.dat upx behavioral2/files/0x0007000000022d43-45.dat upx behavioral2/memory/2056-48-0x0000000000F00000-0x00000000012E7000-memory.dmp upx behavioral2/memory/4724-61-0x0000000000410000-0x00000000007F7000-memory.dmp upx behavioral2/memory/2056-62-0x0000000000F00000-0x00000000012E7000-memory.dmp upx behavioral2/memory/2056-76-0x0000000000F00000-0x00000000012E7000-memory.dmp upx behavioral2/memory/2056-79-0x0000000000F00000-0x00000000012E7000-memory.dmp upx behavioral2/memory/4724-82-0x0000000000410000-0x00000000007F7000-memory.dmp upx behavioral2/memory/4724-104-0x0000000000410000-0x00000000007F7000-memory.dmp upx behavioral2/memory/4724-110-0x0000000000410000-0x00000000007F7000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Stage Research\SRLicenseManager.exe irsetup.exe File created C:\Program Files (x86)\Stage Research\SRLicenseManager.exe irsetup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Setup_SoftPlot9_Log.txt irsetup.exe File opened for modification C:\Windows\Setup_SoftPlot9_Log.txt irsetup.exe File created C:\Windows\SRLicenseManager Setup Log.txt irsetup.exe File opened for modification C:\Windows\SRLicenseManager Setup Log.txt irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1968 SetACL.exe Token: SeRestorePrivilege 1968 SetACL.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4724 irsetup.exe 4724 irsetup.exe 4724 irsetup.exe 5000 SRLicenseManager_Setup.exe 2056 irsetup.exe 2056 irsetup.exe 2056 irsetup.exe 1968 SetACL.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4724 1196 9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe 91 PID 1196 wrote to memory of 4724 1196 9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe 91 PID 1196 wrote to memory of 4724 1196 9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe 91 PID 4724 wrote to memory of 5000 4724 irsetup.exe 94 PID 4724 wrote to memory of 5000 4724 irsetup.exe 94 PID 4724 wrote to memory of 5000 4724 irsetup.exe 94 PID 5000 wrote to memory of 2056 5000 SRLicenseManager_Setup.exe 95 PID 5000 wrote to memory of 2056 5000 SRLicenseManager_Setup.exe 95 PID 5000 wrote to memory of 2056 5000 SRLicenseManager_Setup.exe 95 PID 2056 wrote to memory of 4684 2056 irsetup.exe 99 PID 2056 wrote to memory of 4684 2056 irsetup.exe 99 PID 2056 wrote to memory of 4684 2056 irsetup.exe 99 PID 4684 wrote to memory of 1968 4684 cmd.exe 102 PID 4684 wrote to memory of 1968 4684 cmd.exe 102 PID 4684 wrote to memory of 1968 4684 cmd.exe 102 PID 4724 wrote to memory of 1600 4724 irsetup.exe 108 PID 4724 wrote to memory of 1600 4724 irsetup.exe 108 PID 4724 wrote to memory of 1600 4724 irsetup.exe 108 PID 4724 wrote to memory of 1616 4724 irsetup.exe 110 PID 4724 wrote to memory of 1616 4724 irsetup.exe 110 PID 4724 wrote to memory of 1616 4724 irsetup.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe"C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1790722 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3811856890-180006922-3689258494-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" /S3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /S __IRAOFF:1790722 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3811856890-180006922-3689258494-1000"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\perms.bat5⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SetACL.exeC:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SETACL.EXE -on "C:\ProgramData\Stage Research" -ot file -actn ace -ace "n:S-1-1-0;p:full,write_dacl;s:y;"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
-
-
-
C:\Program Files (x86)\Stage Research\SRLicenseManager.exe"C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot3⤵
- Executes dropped EXE
PID:1600
-
-
C:\Program Files (x86)\Stage Research\SRLicenseManager.exe"C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot3D3⤵
- Executes dropped EXE
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f311f18b5b119ccf17de080de405cc0c
SHA1afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5
SHA25668284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb
SHA512f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6
-
Filesize
1.1MB
MD5f311f18b5b119ccf17de080de405cc0c
SHA1afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5
SHA25668284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb
SHA512f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6
-
Filesize
1.1MB
MD5f311f18b5b119ccf17de080de405cc0c
SHA1afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5
SHA25668284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb
SHA512f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6
-
Filesize
1.1MB
MD5f311f18b5b119ccf17de080de405cc0c
SHA1afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5
SHA25668284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb
SHA512f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6
-
Filesize
502B
MD5ac7943e277671a6eb6720a445963aa06
SHA14289c79d705656ed7500e3f1d0cdeaaa41be23ab
SHA256f1c1b5f197b46ea19379252fb485b0862008254009f980b8905d70ef2440b89b
SHA512af2c6accd82aa05866cc3d44c5c2fbe6ecc119fa9fcfe58b699c5d8a38d197db35eebfb348658c8390682b77a0d35a5c12c0e1cde16a852b654b55aa47521644
-
Filesize
2.6MB
MD58555c66b86694e185593bc58f52b0993
SHA18d53f6f8c77bb47c896cbb54f538ce8fd5208a29
SHA2563ee161add7128d1bed21a20ad9044ad1ee0405f61780f52a6c357395a83d61e9
SHA512d138f44cd5a2ae95b390daed49b4cecb32f188c9ba957f2daa59d61d5a95287edf9ac09aff096c0b11ce68356795bbd716a582556dc38be17253a3028be23f87
-
Filesize
2.6MB
MD58555c66b86694e185593bc58f52b0993
SHA18d53f6f8c77bb47c896cbb54f538ce8fd5208a29
SHA2563ee161add7128d1bed21a20ad9044ad1ee0405f61780f52a6c357395a83d61e9
SHA512d138f44cd5a2ae95b390daed49b4cecb32f188c9ba957f2daa59d61d5a95287edf9ac09aff096c0b11ce68356795bbd716a582556dc38be17253a3028be23f87
-
Filesize
52KB
MD5265c5203f435725d63273321e03d77a7
SHA1d56f8561cbce42fb74ba008c799c1266932d3140
SHA2569c4d55555640f2e317ff9f062d79f2f642ea9b17244376e2d921b6f2933c4d3c
SHA5125fb820a25f39edabee24907570ed4e2f6f8a239d3f3747ff87397e5e1421f36737adaeba3f06778c671606ad1231e68838ad613a3f792708372552c4c454f153
-
Filesize
1.3MB
MD59bdcf813d65265255b820bc7a704da3c
SHA1dad6501711992ab874d778ece5a103e143fd42d7
SHA256b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a
SHA51253cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504
-
Filesize
1.3MB
MD59bdcf813d65265255b820bc7a704da3c
SHA1dad6501711992ab874d778ece5a103e143fd42d7
SHA256b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a
SHA51253cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504
-
Filesize
1.3MB
MD59bdcf813d65265255b820bc7a704da3c
SHA1dad6501711992ab874d778ece5a103e143fd42d7
SHA256b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a
SHA51253cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504
-
Filesize
322KB
MD5c3f5f4a1fb69b5889f0bbb313cf6017f
SHA1e4f592cfbd62a3c3caf27177ccea5a77afa649bb
SHA256769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45
SHA512e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab
-
Filesize
322KB
MD5c3f5f4a1fb69b5889f0bbb313cf6017f
SHA1e4f592cfbd62a3c3caf27177ccea5a77afa649bb
SHA256769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45
SHA512e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab
-
Filesize
296KB
MD52e5a7d12c3170f61a08866600e74075b
SHA1c13e3ee03a215b8620e015fab2f4d6d980f82a73
SHA256f921a1f235dcc23114c359110e63739fc1eb5eed5fe7dcc8346b2b6768d05508
SHA512d4b07286c39f13658da288e1b905c9f2208d6d2ee68cba8d36794127e40e3e0cacbb5caad5ee20938501a912f5cf296c3fb1198fd62ce93d60f8cc09b0ccc486
-
Filesize
296KB
MD52e5a7d12c3170f61a08866600e74075b
SHA1c13e3ee03a215b8620e015fab2f4d6d980f82a73
SHA256f921a1f235dcc23114c359110e63739fc1eb5eed5fe7dcc8346b2b6768d05508
SHA512d4b07286c39f13658da288e1b905c9f2208d6d2ee68cba8d36794127e40e3e0cacbb5caad5ee20938501a912f5cf296c3fb1198fd62ce93d60f8cc09b0ccc486
-
Filesize
106KB
MD51552220bba096485d8dcba87ca7cb5bc
SHA12972f2541f686f1efc3cdf04d52d14e06c63f547
SHA256483a27c72d22fc75f6c3dc50d9ce6a79c3da1f0d4b44d75d4ef35e479b33b18a
SHA5123ab31ad7e7c2512e979ae2b4d633439121090bbf1c6034e9871c49ad5f7dba62c854e44a51edc862d203b6f40e151aee3801aa2d4c1f48ddc0d10c21c1f8e17a
-
Filesize
1.3MB
MD59bdcf813d65265255b820bc7a704da3c
SHA1dad6501711992ab874d778ece5a103e143fd42d7
SHA256b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a
SHA51253cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504
-
Filesize
1.3MB
MD59bdcf813d65265255b820bc7a704da3c
SHA1dad6501711992ab874d778ece5a103e143fd42d7
SHA256b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a
SHA51253cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504
-
Filesize
322KB
MD5c3f5f4a1fb69b5889f0bbb313cf6017f
SHA1e4f592cfbd62a3c3caf27177ccea5a77afa649bb
SHA256769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45
SHA512e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab
-
Filesize
322KB
MD5c3f5f4a1fb69b5889f0bbb313cf6017f
SHA1e4f592cfbd62a3c3caf27177ccea5a77afa649bb
SHA256769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45
SHA512e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab
-
Filesize
153B
MD55a051aca535bdd8a938dd1cc45caaf41
SHA1e6b0c6941112fb411d5b126ffee672c6bbef7d59
SHA2567cf8ebeb2c6e9cff127d10c29f4b130e8e76142e1169fd3a178f4c6439aba44a
SHA51222dc0dbb1309b3ce24fcbb267ee8eced3efc439ca18e8d7212ebee04dfb98441fe36ca0f93b92f5a40b79d932de6d8a428824509f149cab901759293b5f57195