Resubmissions

05/11/2023, 18:37

231105-w9tc4aca85 1

05/11/2023, 18:35

231105-w8mh6aab9v 1

Analysis

  • max time kernel
    45s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 18:37

General

  • Target

    Set-up.exe

  • Size

    7.3MB

  • MD5

    41f159509017d234e08eb4f820bab935

  • SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

  • SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

  • SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • SSDEEP

    98304:wz16s9EwkidrwQwPdz9u/ZZmDZJErFXQbZT7wIX025:wz16gBrd3gu/XmDZiF0t5

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Set-up.exe
    "C:\Users\Admin\AppData\Local\Temp\Set-up.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    PID:1900
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-9-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-10-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-11-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-16-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-15-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-18-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-17-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-19-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-20-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB

  • memory/1588-21-0x000001D559D10000-0x000001D559D11000-memory.dmp

    Filesize

    4KB