Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 14:06

General

  • Target

    9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe

  • Size

    83.4MB

  • MD5

    02cc214e55afe8ffeda663a417509324

  • SHA1

    1d406103f7d638dd3c0491670b495ed84efcbb74

  • SHA256

    9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b

  • SHA512

    363d7c50120a4fa96ea347a0cd47f638b8d55a40c14c0d8f7152bc1f0d8807cec5288f79db6d15928614eb3c733ce94a558940f06b223c785db812f57c4d6458

  • SSDEEP

    1572864:KgTwTuS+YBem/SSte6JUgdjlROqNnVyizOAkR5TwoDTTwoDAB:KgTwT1+bzS7jTOMR6YoDQoDW

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe
    "C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1790722 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\9c18548340e363d24f9f358ba12dc3e00f0e22cbdfb2ea21d30a293f2739396b.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3811856890-180006922-3689258494-1000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" /S
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe
          "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /S __IRAOFF:1790722 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-3811856890-180006922-3689258494-1000"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\perms.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4684
            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SetACL.exe
              C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SETACL.EXE -on "C:\ProgramData\Stage Research" -ot file -actn ace -ace "n:S-1-1-0;p:full,write_dacl;s:y;"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1968
      • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe
        "C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot
        3⤵
        • Executes dropped EXE
        PID:1600
      • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe
        "C:\Program Files (x86)\Stage Research\SRLicenseManager.exe" SoftPlot3D
        3⤵
        • Executes dropped EXE
        PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe

    Filesize

    1.1MB

    MD5

    f311f18b5b119ccf17de080de405cc0c

    SHA1

    afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5

    SHA256

    68284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb

    SHA512

    f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6

  • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe

    Filesize

    1.1MB

    MD5

    f311f18b5b119ccf17de080de405cc0c

    SHA1

    afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5

    SHA256

    68284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb

    SHA512

    f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6

  • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe

    Filesize

    1.1MB

    MD5

    f311f18b5b119ccf17de080de405cc0c

    SHA1

    afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5

    SHA256

    68284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb

    SHA512

    f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6

  • C:\Program Files (x86)\Stage Research\SRLicenseManager.exe

    Filesize

    1.1MB

    MD5

    f311f18b5b119ccf17de080de405cc0c

    SHA1

    afc8a6ac0eaa25d8e48a903bd88be1b6aedf88b5

    SHA256

    68284660d3066fba789f08e0167ad13aecfbd84fb648c0e3706c2497c1b2abcb

    SHA512

    f8101749c649228e80ab69b4ca7766c755ecfa29ba609da841c96bab8df7e31db7dc652b0df96d9661feea602fea0c07a6d6a31c4adf295c33f990b81a0d63b6

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SRLicenseManager.exe.log

    Filesize

    502B

    MD5

    ac7943e277671a6eb6720a445963aa06

    SHA1

    4289c79d705656ed7500e3f1d0cdeaaa41be23ab

    SHA256

    f1c1b5f197b46ea19379252fb485b0862008254009f980b8905d70ef2440b89b

    SHA512

    af2c6accd82aa05866cc3d44c5c2fbe6ecc119fa9fcfe58b699c5d8a38d197db35eebfb348658c8390682b77a0d35a5c12c0e1cde16a852b654b55aa47521644

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe

    Filesize

    2.6MB

    MD5

    8555c66b86694e185593bc58f52b0993

    SHA1

    8d53f6f8c77bb47c896cbb54f538ce8fd5208a29

    SHA256

    3ee161add7128d1bed21a20ad9044ad1ee0405f61780f52a6c357395a83d61e9

    SHA512

    d138f44cd5a2ae95b390daed49b4cecb32f188c9ba957f2daa59d61d5a95287edf9ac09aff096c0b11ce68356795bbd716a582556dc38be17253a3028be23f87

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SRLicenseManager\SRLicenseManager_Setup.exe

    Filesize

    2.6MB

    MD5

    8555c66b86694e185593bc58f52b0993

    SHA1

    8d53f6f8c77bb47c896cbb54f538ce8fd5208a29

    SHA256

    3ee161add7128d1bed21a20ad9044ad1ee0405f61780f52a6c357395a83d61e9

    SHA512

    d138f44cd5a2ae95b390daed49b4cecb32f188c9ba957f2daa59d61d5a95287edf9ac09aff096c0b11ce68356795bbd716a582556dc38be17253a3028be23f87

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\SoftPlot10Icon.ico

    Filesize

    52KB

    MD5

    265c5203f435725d63273321e03d77a7

    SHA1

    d56f8561cbce42fb74ba008c799c1266932d3140

    SHA256

    9c4d55555640f2e317ff9f062d79f2f642ea9b17244376e2d921b6f2933c4d3c

    SHA512

    5fb820a25f39edabee24907570ed4e2f6f8a239d3f3747ff87397e5e1421f36737adaeba3f06778c671606ad1231e68838ad613a3f792708372552c4c454f153

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    1.3MB

    MD5

    9bdcf813d65265255b820bc7a704da3c

    SHA1

    dad6501711992ab874d778ece5a103e143fd42d7

    SHA256

    b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a

    SHA512

    53cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    1.3MB

    MD5

    9bdcf813d65265255b820bc7a704da3c

    SHA1

    dad6501711992ab874d778ece5a103e143fd42d7

    SHA256

    b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a

    SHA512

    53cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

    Filesize

    1.3MB

    MD5

    9bdcf813d65265255b820bc7a704da3c

    SHA1

    dad6501711992ab874d778ece5a103e143fd42d7

    SHA256

    b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a

    SHA512

    53cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

    Filesize

    322KB

    MD5

    c3f5f4a1fb69b5889f0bbb313cf6017f

    SHA1

    e4f592cfbd62a3c3caf27177ccea5a77afa649bb

    SHA256

    769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45

    SHA512

    e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

    Filesize

    322KB

    MD5

    c3f5f4a1fb69b5889f0bbb313cf6017f

    SHA1

    e4f592cfbd62a3c3caf27177ccea5a77afa649bb

    SHA256

    769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45

    SHA512

    e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SetACL.exe

    Filesize

    296KB

    MD5

    2e5a7d12c3170f61a08866600e74075b

    SHA1

    c13e3ee03a215b8620e015fab2f4d6d980f82a73

    SHA256

    f921a1f235dcc23114c359110e63739fc1eb5eed5fe7dcc8346b2b6768d05508

    SHA512

    d4b07286c39f13658da288e1b905c9f2208d6d2ee68cba8d36794127e40e3e0cacbb5caad5ee20938501a912f5cf296c3fb1198fd62ce93d60f8cc09b0ccc486

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\SetACL.exe

    Filesize

    296KB

    MD5

    2e5a7d12c3170f61a08866600e74075b

    SHA1

    c13e3ee03a215b8620e015fab2f4d6d980f82a73

    SHA256

    f921a1f235dcc23114c359110e63739fc1eb5eed5fe7dcc8346b2b6768d05508

    SHA512

    d4b07286c39f13658da288e1b905c9f2208d6d2ee68cba8d36794127e40e3e0cacbb5caad5ee20938501a912f5cf296c3fb1198fd62ce93d60f8cc09b0ccc486

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.dat

    Filesize

    106KB

    MD5

    1552220bba096485d8dcba87ca7cb5bc

    SHA1

    2972f2541f686f1efc3cdf04d52d14e06c63f547

    SHA256

    483a27c72d22fc75f6c3dc50d9ce6a79c3da1f0d4b44d75d4ef35e479b33b18a

    SHA512

    3ab31ad7e7c2512e979ae2b4d633439121090bbf1c6034e9871c49ad5f7dba62c854e44a51edc862d203b6f40e151aee3801aa2d4c1f48ddc0d10c21c1f8e17a

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

    Filesize

    1.3MB

    MD5

    9bdcf813d65265255b820bc7a704da3c

    SHA1

    dad6501711992ab874d778ece5a103e143fd42d7

    SHA256

    b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a

    SHA512

    53cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

    Filesize

    1.3MB

    MD5

    9bdcf813d65265255b820bc7a704da3c

    SHA1

    dad6501711992ab874d778ece5a103e143fd42d7

    SHA256

    b15d67b4a57184e5202df3c25e20dc0b7f853f4d527d148b337138900989824a

    SHA512

    53cac68a57194ec33ccc5c212a6b82bc554e85c86faab4e095876f5c037f680c646ce8463857e61438b92cb7ca7c17efea1d713a9d772d9f2afeb5ddd17b6504

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\lua5.1.dll

    Filesize

    322KB

    MD5

    c3f5f4a1fb69b5889f0bbb313cf6017f

    SHA1

    e4f592cfbd62a3c3caf27177ccea5a77afa649bb

    SHA256

    769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45

    SHA512

    e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\lua5.1.dll

    Filesize

    322KB

    MD5

    c3f5f4a1fb69b5889f0bbb313cf6017f

    SHA1

    e4f592cfbd62a3c3caf27177ccea5a77afa649bb

    SHA256

    769416fa7edf38e91a55f4f7163914ee4aad9c8c890ed641c300b73157acac45

    SHA512

    e17d3be36fd2ba892d945f3737ebffdefe6d476224ef3459b567579971559a048a886941f57ae671b3df32844f99575a14c72ef8c49c2d4b1e8352204ccc05ab

  • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\perms.bat

    Filesize

    153B

    MD5

    5a051aca535bdd8a938dd1cc45caaf41

    SHA1

    e6b0c6941112fb411d5b126ffee672c6bbef7d59

    SHA256

    7cf8ebeb2c6e9cff127d10c29f4b130e8e76142e1169fd3a178f4c6439aba44a

    SHA512

    22dc0dbb1309b3ce24fcbb267ee8eced3efc439ca18e8d7212ebee04dfb98441fe36ca0f93b92f5a40b79d932de6d8a428824509f149cab901759293b5f57195

  • memory/1600-91-0x0000000005350000-0x00000000058F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1600-93-0x0000000004CB0000-0x0000000004CCC000-memory.dmp

    Filesize

    112KB

  • memory/1600-96-0x00000000727F0000-0x0000000072FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1600-94-0x0000000004E40000-0x0000000004EA6000-memory.dmp

    Filesize

    408KB

  • memory/1600-92-0x0000000004DA0000-0x0000000004E32000-memory.dmp

    Filesize

    584KB

  • memory/1600-87-0x00000000727F0000-0x0000000072FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1600-88-0x00000000001D0000-0x00000000002E4000-memory.dmp

    Filesize

    1.1MB

  • memory/1600-89-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/1600-90-0x00000000025A0000-0x00000000025B6000-memory.dmp

    Filesize

    88KB

  • memory/1616-100-0x00000000727F0000-0x0000000072FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1616-103-0x00000000727F0000-0x0000000072FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1616-101-0x00000000016F0000-0x0000000001706000-memory.dmp

    Filesize

    88KB

  • memory/1616-102-0x0000000005620000-0x0000000005630000-memory.dmp

    Filesize

    64KB

  • memory/2056-76-0x0000000000F00000-0x00000000012E7000-memory.dmp

    Filesize

    3.9MB

  • memory/2056-48-0x0000000000F00000-0x00000000012E7000-memory.dmp

    Filesize

    3.9MB

  • memory/2056-79-0x0000000000F00000-0x00000000012E7000-memory.dmp

    Filesize

    3.9MB

  • memory/2056-62-0x0000000000F00000-0x00000000012E7000-memory.dmp

    Filesize

    3.9MB

  • memory/4724-14-0x0000000000410000-0x00000000007F7000-memory.dmp

    Filesize

    3.9MB

  • memory/4724-61-0x0000000000410000-0x00000000007F7000-memory.dmp

    Filesize

    3.9MB

  • memory/4724-82-0x0000000000410000-0x00000000007F7000-memory.dmp

    Filesize

    3.9MB

  • memory/4724-104-0x0000000000410000-0x00000000007F7000-memory.dmp

    Filesize

    3.9MB

  • memory/4724-110-0x0000000000410000-0x00000000007F7000-memory.dmp

    Filesize

    3.9MB