Analysis
-
max time kernel
140s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
HS6Setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
HS6Setup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
HS6Setup.exe
-
Size
4.7MB
-
MD5
ddffd04865d9320469da7ba82202d0a0
-
SHA1
a8eed0f1a5e1fa9814ec55bea8c0717305ed7e78
-
SHA256
ca758727fd8b6cf135a2dc9b25c7deaeb065ce9575756e84b0cbc1b0b01e1bd7
-
SHA512
7860f08ebc342676171950a5c2f2691cd07d7e66ac472da55724a9a581feab6befd6f146de5d09075d118d98e25688e0b0aa5fcedd12cb1c95a9a074c64243c1
-
SSDEEP
98304:XXYKvaVjMkx0YEZ7oEI/GuiKmd6MeMZECxvWLay2ynDsgPCQvRZzXQw:HYFjboSPfXZ/MZEkYacscCOzXQw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation HS6Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1080 setup.exe 1080 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 1080 3356 HS6Setup.exe 90 PID 3356 wrote to memory of 1080 3356 HS6Setup.exe 90 PID 3356 wrote to memory of 1080 3356 HS6Setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\HS6Setup.exe"C:\Users\Admin\AppData\Local\Temp\HS6Setup.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD526ceb54ab51ccfdb8defdafa3f744678
SHA1f442b8f88da130a6d86e667a2f6805fd34238471
SHA25645085031f083af00656bb665dc1e17f5880621dfcdf637a02e637fbcc189371a
SHA512cdfca01776c2a83634700d7a040a08c9c65447d925cfb82fbef2dfbf782ae8bc64d548107f632508f98b0a95525820a1602da79d8105de51f8fb3174debc1cbc
-
Filesize
709KB
MD58b69fba4287d095c30ac2f57c311fa31
SHA1ca151261ae867b5ad2abb1fa54ff40243c002234
SHA256c9ca4c3ff2e6a7d8610709afdbe4979717f2d557770b849921ba1b47febf226a
SHA512a04243081cc7e4a68f77c3381fafa68ff03abbdc8266ceb6283e10ecd6c70dfff87e1f78e135a953ce352063131c34c120a1617494bd05c2d9852c04701d6491