Analysis
-
max time kernel
99s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
BeetleSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
BeetleSetup.exe
Resource
win10v2004-20231222-en
General
-
Target
BeetleSetup.exe
-
Size
2.9MB
-
MD5
61581e3c277ea641450eba827f289920
-
SHA1
469ba0ca49d7672ae1f262681c80d976404209bb
-
SHA256
380a713605ba9620df773960e9945cfeda8a97c14cd988026bdc1faede74d9d8
-
SHA512
469b22766a1162cc63062c36a11163d4d7c341b7abd8a3dd30fad6a6e5eba75e6ac2ba1bd8d384b54826c6dfd6ac3a7145b26bdb02a98a8e91ecf82e0ff2a9de
-
SSDEEP
49152:hfQ+cO48khxpi/IlZdK4VnHcqy8IRTRbdx1wQoZTEo1eeAAjAILdt8M3gmV4OYo9:hfRcO48kquZdXTgH1puTT1eePkCf78O9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 380 setup.exe -
resource yara_rule behavioral2/memory/380-9-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/files/0x00070000000231ff-8.dat upx behavioral2/files/0x00070000000231ff-7.dat upx behavioral2/memory/380-12-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 380 4184 BeetleSetup.exe 27 PID 4184 wrote to memory of 380 4184 BeetleSetup.exe 27 PID 4184 wrote to memory of 380 4184 BeetleSetup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\BeetleSetup.exe"C:\Users\Admin\AppData\Local\Temp\BeetleSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\ae10202\setup.exeC:\Users\Admin\AppData\Local\Temp\ae10202\setup.exe -d "C:\Users\Admin\AppData\Local\Temp"2⤵
- Executes dropped EXE
PID:380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5679b40a42f08c87f4788fe7ca3cc8546
SHA1fb85fffc80e10c1a9cf336c64ee1cbf91029675f
SHA256fee674dc569547478d19f37849b0badf4f8f51c21963852c48fbe50a60f2914e
SHA5124984900777c3e840b44dc35d31921faf17a0a880a71f25d924c59d7ca622cf47be08bf6e18059b298b7151da5877a1d1939402068b320dbe051fd1ac8eecb40f
-
Filesize
149KB
MD5808e84852804a6a0a036edf798428f6c
SHA18b8923c86da2bd7fbe15bf8ec0178fa210b06e8e
SHA2562208362d112c755d569a03e28282b30dd53ddd79fe44dcde6ecad23ea82b37b2
SHA5129df79af8b7fd4945ffc58122063ba797b39a905f1665ce4c802a30bf8c721e1498296862fee0aa9291456aae0f6bc6634a5303ac22b336f927ba290c25b4ef6a