Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
x86_x64_setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
x86_x64_setup.exe
Resource
win10v2004-20231222-en
General
-
Target
x86_x64_setup.exe
-
Size
2.5MB
-
MD5
743e92349fa4e70b5d34bd9be733b41c
-
SHA1
a1b82c3d1be61ba56e448a819990584df70a2fb4
-
SHA256
486a9c9cdb67b95932d7e7deda2cdea44621c2b3f407f1206c1f3ce3766850ec
-
SHA512
753a6314fcfa83302062e08d5704411234e321ff3eaf14ed92964576229491448e6960569c35c135fced32a80bdb65657343c08b8b1227d742377917052f0db5
-
SSDEEP
49152:EgXyw1i3r1pIbtMja//3W6wNG3Ja0NDuYS5pwybSUZgBffTVSX:JXy3IbtMjalwy1N6YSnXZgB3Jq
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ipinfo.io 14 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1780 4400 WerFault.exe 4584 4348 WerFault.exe 44 804 3876 WerFault.exe 41 4764 3932 WerFault.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\x86_x64_setup.exe"C:\Users\Admin\AppData\Local\Temp\x86_x64_setup.exe"1⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0D096717\setup_install.exe"3⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_7.exe1⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_7.exesahiba_7.exe2⤵PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_3.exesahiba_3.exe1⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 11642⤵
- Program crash
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_4.exesahiba_4.exe1⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4400 -ip 44001⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 4721⤵
- Program crash
PID:1780
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_6.exesahiba_6.exe1⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_2.exesahiba_2.exe1⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 3842⤵
- Program crash
PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_1.exesahiba_1.exe1⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_1.exe" -a2⤵PID:804
-
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6082⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4348 -ip 43481⤵PID:4928
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7zS0D096717\sahiba_5.exesahiba_5.exe1⤵PID:2744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_6.exe1⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_5.exe1⤵PID:1608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_4.exe1⤵PID:2912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_3.exe1⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_2.exe1⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_1.exe1⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3876 -ip 38761⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3932 -ip 39321⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5305c00c540e5c010533765562d65c13e
SHA1aacc016e7852e78e73a26cc19e6aca30b4a1161a
SHA256bf1a789cc4befb3927cf39258e6111b2bbb8720b8e8d811daefdcd6a45500b4a
SHA512b1b86d6d8d62f8f7a9c12902da86ba54a651094360101810f6fb68937531caed8ac09973462cc9f20f0381da1b634049fb6ca0f6c5b74b57fae2c74bece7867a
-
Filesize
192KB
MD501a6adc45c5f02ca2b394f7caa8f7e19
SHA188d8ce1fab3cac042da4b9ec721dfddfddafc21c
SHA256e4940ec298b1a9e056dd08d6a29d1f4002e6fed328c2f1c2e7bce50b602dced0
SHA512baa18b8470ec824cb93abc96c2c5bd40b45b143649f299fb1d45a6186a3e96ae32dffc3eb00d576cbc02d759e4f954811916899544e7918dce928b5016200f02