Analysis
-
max time kernel
148s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20231215-en
General
-
Target
setup.exe
-
Size
1.4MB
-
MD5
c1dc83d49a31f55bda3e131a4fcd0781
-
SHA1
a9caa16621370027a292f192921ffc852ad67c8e
-
SHA256
ce2cb1b600384f96c477eb1e673ff3a31980218389e18e83558337de7cc197de
-
SHA512
39a03282fe889f6b15d11a4872c632da59ca16893d21a878f1690592e65932af56eccc0cc4914c52e9f946f66a934d4240d9f8daef0fcdbc7ce97164d39d610d
-
SSDEEP
24576:PI39dseltHKVyWuWGMlhUAlOaMWO6+3Bd3iLB+E/iDMlSrkGvoVn:P6dvTWnbUAMae6+R5yB+E/e4Gy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4856 is-TNH1T.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4856 4296 setup.exe 21 PID 4296 wrote to memory of 4856 4296 setup.exe 21 PID 4296 wrote to memory of 4856 4296 setup.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\is-6NCIM.tmp\is-TNH1T.tmp"C:\Users\Admin\AppData\Local\Temp\is-6NCIM.tmp\is-TNH1T.tmp" /SL4 $5006C "C:\Users\Admin\AppData\Local\Temp\setup.exe" 1181572 1756162⤵
- Executes dropped EXE
PID:4856
-