Analysis
-
max time kernel
147s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20231215-en
General
-
Target
setup.exe
-
Size
495KB
-
MD5
41ae59dd32719f732efe3c0cb046f214
-
SHA1
0505791cef705acce37055581c9806b7a2a31861
-
SHA256
8e6a15abfb4424b5d1b3421cee914d54081681792f7f76a0f973a0dc9909e2ca
-
SHA512
4e0fba5842cbad89e12f119439bc045178b8297daef4edf6af5dcb9396862a545de2ce65e4c33118842c3f0bcc8637d89557b2a78e3969211c5dc870f9c32c18
-
SSDEEP
12288:jbsZotvWw8iVAJfQebR5iplLL5tMjyQHvqJX3Aj/:c6Ww7VATbfNeQHvu3Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 is-MO00S.tmp -
Loads dropped DLL 3 IoCs
pid Process 1228 setup.exe 2920 is-MO00S.tmp 2920 is-MO00S.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2920 is-MO00S.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27 PID 1228 wrote to memory of 2920 1228 setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\is-GDUV9.tmp\is-MO00S.tmp"C:\Users\Admin\AppData\Local\Temp\is-GDUV9.tmp\is-MO00S.tmp" /SL4 $4016E C:\Users\Admin\AppData\Local\Temp\setup.exe 283225 512002⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD5efc2604860bda32871d69bbc4c606630
SHA13992538a4aaa29467f5ec1021e97cd85f9f66671
SHA2563cec0a2be2d1dffca5254b65e8c7029a0fb06e75c5217e2cbfd3758867363c5b
SHA5124031a27e8f582402743ac876c752d5b0ab74a4550fabc812c0e5c0e1481a165eff95555d1f186b1cb39bfebf3d1bac7542ff8f1602b93a30145196c6ea136fad
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3