Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
Setup_WinThruster_2024.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Setup_WinThruster_2024.exe
Resource
win10v2004-20231215-en
General
-
Target
Setup_WinThruster_2024.exe
-
Size
7.3MB
-
MD5
62f9258f3ae4774f9dc169a2a0b1d68e
-
SHA1
56164f50722724275c0db381235d3b793f85acd5
-
SHA256
82f5a693742c6c35f1280dbc5a4148598c129208dfc0544a5cd457b7ac8e824a
-
SHA512
ef04a48d957d646e0b4fbdb68bfe59bedfb6f5701dd9497b2bc5abeea57b5d7be5f8694ca59d535c8d14514ecacfb6773476abcd3d2f65a1da7c0c75241d7fd2
-
SSDEEP
98304:cSi3CpUYtyBI5sdXR/YVTWXumt2Q7VJedSNtjrk8rNF3y0HWRR4cmWDjzK45:IClt4I+yTd2rJzrjr7H3r2R2qHb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Setup_WinThruster_2024.tmppid process 2708 Setup_WinThruster_2024.tmp -
Loads dropped DLL 1 IoCs
Processes:
Setup_WinThruster_2024.exepid process 2656 Setup_WinThruster_2024.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Setup_WinThruster_2024.tmppid process 2708 Setup_WinThruster_2024.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Setup_WinThruster_2024.exedescription pid process target process PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp PID 2656 wrote to memory of 2708 2656 Setup_WinThruster_2024.exe Setup_WinThruster_2024.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\is-D09R0.tmp\Setup_WinThruster_2024.tmp"C:\Users\Admin\AppData\Local\Temp\is-D09R0.tmp\Setup_WinThruster_2024.tmp" /SL5="$40112,6737092,878080,C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2708
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-D09R0.tmp\Setup_WinThruster_2024.tmpFilesize
398KB
MD5995837abd6759abf9595fe238f873c4d
SHA1bf7bb392e89def77a7cac859cb47d032b168ba30
SHA2569b9860b3b818a4339024f5b39773213e886c616b647f59e10fe68d1fdebb3464
SHA51211465f85d40286f2c98f4fd6c6fd7d6f09c2fdb98303db0195c873f23e6bd06691c53b2d61589158f07c8c6d2da3a84ab132cffefc1aaf7e0b72956218ccc153
-
\Users\Admin\AppData\Local\Temp\is-D09R0.tmp\Setup_WinThruster_2024.tmpFilesize
45KB
MD58296cc76b5e008c19ee6581ae8db1696
SHA1bf66092dc85d8c57f9c67eb2ac77c5e0c3b2f750
SHA256ea117da9db7e15d033fa09c6732b5dc8d090427d00712b8f7b318750bd755e80
SHA51228134068a20aa97aa72832957bac7916167bcfad6299fa345b75139c2ce1b98ee43447fdbbde1ba958d2626999ab659364572be7b7a54693f178ee2f74d4b9e8
-
memory/2656-1-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/2656-12-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/2708-8-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2708-13-0x0000000000400000-0x000000000071D000-memory.dmpFilesize
3.1MB
-
memory/2708-16-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB