Analysis

  • max time kernel
    187s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:21

General

  • Target

    setup.exe

  • Size

    6.1MB

  • MD5

    ec195f6a81317b2ac86e4cd75eaec7ff

  • SHA1

    426ed02df63cb185f8795e110cb1f25cfadcedaa

  • SHA256

    1094bde767bdaa17dbf97c9d5ce3560dafb1d176645b6d86c5a1dbef9c987306

  • SHA512

    b4d5a7ff372ec3d37dd8e00d2ad753c6b20664bba315ede17fc403cf2fbdf5850d533f396fefcc8e616455cca271b3fc30dd154e8a3af325c966103379a64e3e

  • SSDEEP

    98304:+I/YZttVyv2WAotv3B9kRkgw/EQ/DP5vCMwryrFbTHaeaxJCr+p+ZQCp6coOROFC:+I/YCvNvx9kygwc6Vvx9uRz0FoweC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
        "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:2704
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini

    Filesize

    27KB

    MD5

    62d5f9827d867eb3e4ab9e6b338348a1

    SHA1

    828e72f9c845b1c0865badaef40d63fb36447293

    SHA256

    5214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5

    SHA512

    b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe

    Filesize

    600KB

    MD5

    b3fd01873bd5fd163ab465779271c58f

    SHA1

    e1ff9981a09ab025d69ac891bfc931a776294d4d

    SHA256

    985eb55ecb750da812876b8569d5f1999a30a24bcc54f9bab4d3fc44dfedb931

    SHA512

    6674ab1d65da9892b7dd2fd37f300e087f58239262d44505b53379c676fd16da5443d2292aeaae01d3e6c40960b12f9cac651418c827d2a33c29a6cdf874be43

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctor.dll

    Filesize

    76KB

    MD5

    003a6c011aac993bcde8c860988ce49b

    SHA1

    6d39d650dfa5ded45c4e0cb17b986893061104a7

    SHA256

    590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a

    SHA512

    032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuser.dll

    Filesize

    172KB

    MD5

    377765fd4de3912c0f814ee9f182feda

    SHA1

    a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1

    SHA256

    8efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb

    SHA512

    31befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710

  • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objectps.dll

    Filesize

    32KB

    MD5

    8f02b204853939f8aefe6b07b283be9a

    SHA1

    c161b9374e67d5fa3066ea03fc861cc0023eb3cc

    SHA256

    32c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998

    SHA512

    8df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59

  • C:\Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll

    Filesize

    220KB

    MD5

    b2f7e6dc7e4aae3147fbfc74a2ddb365

    SHA1

    716301112706e93f85977d79f0e8f18f17fb32a7

    SHA256

    4f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1

    SHA512

    e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\IKernel.ex_

    Filesize

    338KB

    MD5

    93b63f516482715a784bbec3a0bf5f3a

    SHA1

    2478feca446576c33e96e708256d4c6c33e3fa68

    SHA256

    fbf95719b956b548b947436e29feb18bb884e01f75ae31b05c030ebd76605249

    SHA512

    2c8f29dda748e21231ab8c30c7a57735104b786120bb392eb1c20a320f2dddde392d136fd0c70853bb9af851bbe47df2955d8f9d5973b64870ac90bd12d2dd70

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\Setup.exe

    Filesize

    163KB

    MD5

    6911bc3432dfaf16063f6c2af5eb4b52

    SHA1

    94e77684fe200b189061207b5fd042bb22d2f37d

    SHA256

    ad22c57908918f70864634b2580cb57237dbd1031f6f7a662f7644cfe0b57528

    SHA512

    6702cba5a3d05637017a76812970e32701d3a96b84e95819b633426495eb98ccfc1254753d49525a3e20ebddd2ae23b1df495139ffc6aeb697e772efdd045f3a

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\data1.cab

    Filesize

    1.6MB

    MD5

    bfbafdaad8895cf45cb82372a2754532

    SHA1

    f379f1104955591bfcaa3edf29cd371fc30a15ee

    SHA256

    aed71be9391d558d961049bb62b5a2fc481c64c1cd5ea3398bc80bd587649cc2

    SHA512

    9207dfb3585bc97dbceb617de08648fb34be9cd992cea73ddb5a9c10f1c4019099ff16351a9094a6967ce39249d359504a2c3e62d9b3a8b03ce5df72c09bc288

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\layout.bin

    Filesize

    438B

    MD5

    6b8acf01949169df4accb1d1814dcc01

    SHA1

    400d9678eacc772ac28e170d89893bb75f37ac1d

    SHA256

    4bd164fed5fbc2dc457c8579a26557cd91bf411d13955813e555ae7fae166988

    SHA512

    133d8c8acc48cbb6b60670afafeca460b424cc97ecf90844b0b2c9345d8c297c889918af33116ae1609280a1caa326dce974d067932b389efbd669473f15a894

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\setup.ini

    Filesize

    88B

    MD5

    18385c2fabc5eff33c2fd70a8648a4e5

    SHA1

    aa1199a349c5412076ebf52d7a3aea20131299ac

    SHA256

    48f0ce4519b1e9cb3c93da973e45005418527b546ceabe9f5f410b4bd909d59d

    SHA512

    32ec0aa8acda15faef7a28ff4860270d9d931206aaf1575936f9556ad8ac205674d2c8b209ee12dc9361b0f0c1c0f78f290305c4b229ab13b84af8b5b11362ed

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\Disk1\setup.inx

    Filesize

    165KB

    MD5

    5e4fecbb72aa3692d8aeba6fdeca0f4c

    SHA1

    914ecd957a01d2579505257bb1989d331769dec5

    SHA256

    b995aa690fcd767cc63b9562e4ad35e9a884a8c54dd8aa864d725cb362e9bbe9

    SHA512

    c0a4447d8022c565a0d6135950481819eac5dd90aaf858f45f1f0623da86e1b037a3f0edd3b739e70ea121f988a9f73b314dce5c346a903960cffb1074b29596

  • C:\Users\Admin\AppData\Local\Temp\pftDD8C~tmp\pftw1.pkg

    Filesize

    6.0MB

    MD5

    03ff2848c6597d67d93e052afe7a4a54

    SHA1

    8150f108205400359a9973f59d22d0943f86eff9

    SHA256

    5285ca6ba90dfd734f5921d8a72dedaa5771dd02138a20a0264c59678818edfa

    SHA512

    e79d8901f27a2a5bff44143fda98ea5e95eb4c21cd162433d1ca8c6d27e24a2f91bfac573c2af2b6328781f08967000bcad8dd583463d17251ff867e67a2443d

  • C:\Users\Admin\AppData\Local\Temp\plf9A18.tmp

    Filesize

    3KB

    MD5

    487e6047b73aaf627cb042c2ca3d0d71

    SHA1

    bfd2b9e9d65a92e5c3bd172a34846602b4fdd134

    SHA256

    2c724778570a1c3a7391ec672e5b21c30ddf0d5369c89e3d6f2e164735c60159

    SHA512

    3a06c2466ef745a525aebcd8f17971637d497275728f85b51d8acaa4238955c4b70b6c2d1b807b1c84cc12e0fb580454c06a0d8d7855cbae872096822b13834b

  • C:\Users\Admin\AppData\Local\Temp\{BA3ECDCB-2D7D-42F5-9E97-0493DBAF4E07}\Install.dll

    Filesize

    284KB

    MD5

    6d1844e2a91e1299f6c29f40b281a37d

    SHA1

    c611bde0e58f95991c3015ce2a422fb0a63eded0

    SHA256

    604d261cc19c5edcf2db2ce1a7066b870bff31937a18a60b274c873a690a3341

    SHA512

    b93e153f18cbd0f235682598bf76a808b08a37656d00711cf059a91c21ece57834953c1abe210c4195fd62dea8b9b127f7223f573018d94b5f4e2710f016f62a

  • C:\Users\Admin\AppData\Local\Temp\{BA3ECDCB-2D7D-42F5-9E97-0493DBAF4E07}\_IsRes.dll

    Filesize

    168KB

    MD5

    d0e6f78a6a1ebf684bc8fafc040f07b8

    SHA1

    2e4c8c53586e64f103e8289f9c45de5ef66be431

    SHA256

    b219c50fa0be676b9ca60315369804839c657152f526bb49d00d29b788e0f1ee

    SHA512

    a06b6da40b75deda65b9f9eec06fbeabf18010571f4526d265f1df1ed9e093d2bd066dc18ed4fdaa6fc58fa2efcf059918d181cb41e21afedf7df9f3c3dcb170

  • C:\Users\Admin\AppData\Local\Temp\{BA3ECDCB-2D7D-42F5-9E97-0493DBAF4E07}\isrt.dll

    Filesize

    316KB

    MD5

    13b70633df1bf63e19fe4a74a53b8896

    SHA1

    f542f67cc15002f76f3ab9230297ccca2461c009

    SHA256

    7f852b5ee852ae2870d63db4d9cac454e08e93104d18bf5c9efc068d85c35147

    SHA512

    5fe27c41fb5de0ae2373295d0f5b13be7d863161e94d29bbeddb84acab4300a9bc93482c80f874ccaa9fa20b2066d7824c530ac3f4575bb999da3f594ccd4a2b

  • \??\c:\users\admin\appdata\local\temp\pftdd8c~tmp\disk1\data1.hdr

    Filesize

    19KB

    MD5

    99b1c0a740ed18d5bffdcc73150c4828

    SHA1

    7603957284246f851bcc059cbdeb5e56e667afe3

    SHA256

    c124ccb9712a737a2cdb4132b56b1fd8e51e5271bfd5ef9b84df328a6c29946b

    SHA512

    bdde0e9126aaa9f7651a14cd39e98b84a50e49e7cb883f08d2ec10e59b96601006104cdee5a76a078c56ea94e4ade1dec20655ef90ee6e5d9e60dfc402444d5f

  • memory/2252-166-0x0000000003380000-0x0000000003393000-memory.dmp

    Filesize

    76KB

  • memory/2252-172-0x00000000033A0000-0x00000000033D8000-memory.dmp

    Filesize

    224KB

  • memory/2252-180-0x00000000033E0000-0x0000000003432000-memory.dmp

    Filesize

    328KB

  • memory/2252-186-0x0000000003480000-0x00000000034AC000-memory.dmp

    Filesize

    176KB

  • memory/2252-198-0x0000000003D20000-0x0000000003D6F000-memory.dmp

    Filesize

    316KB