Overview
overview
10Static
static
106c5db6dce1...3e.exe
windows7-x64
106c5db6dce1...3e.exe
windows10-2004-x64
10DusBrowserInst.exe
windows7-x64
6DusBrowserInst.exe
windows10-2004-x64
6IDWCH2.exe
windows7-x64
7IDWCH2.exe
windows10-2004-x64
7Litever01.exe
windows7-x64
10Litever01.exe
windows10-2004-x64
10anyname.exe
windows7-x64
3anyname.exe
windows10-2004-x64
7app.exe
windows7-x64
10app.exe
windows10-2004-x64
10askinstall50.exe
windows7-x64
10askinstall50.exe
windows10-2004-x64
10farlab_setup.exe
windows7-x64
7farlab_setup.exe
windows10-2004-x64
7inst002.exe
windows7-x64
10inst002.exe
windows10-2004-x64
10jamesnew.exe
windows7-x64
3jamesnew.exe
windows10-2004-x64
3justdezine.exe
windows7-x64
10justdezine.exe
windows10-2004-x64
10md3_3kvm.exe
windows7-x64
10md3_3kvm.exe
windows10-2004-x64
10mixseven.exe
windows7-x64
10mixseven.exe
windows10-2004-x64
10redcloud.exe
windows7-x64
10redcloud.exe
windows10-2004-x64
10vguuu.exe
windows7-x64
6vguuu.exe
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 08:58
Behavioral task
behavioral1
Sample
6c5db6dce13ded4e0e6c7e9a526b063e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c5db6dce13ded4e0e6c7e9a526b063e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
DusBrowserInst.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DusBrowserInst.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
IDWCH2.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IDWCH2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Litever01.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Litever01.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
anyname.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
anyname.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
app.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
app.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
askinstall50.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
askinstall50.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
farlab_setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
farlab_setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
inst002.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
inst002.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
jamesnew.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
jamesnew.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
justdezine.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
justdezine.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
md3_3kvm.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
md3_3kvm.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
mixseven.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
mixseven.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
redcloud.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
redcloud.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
vguuu.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
vguuu.exe
Resource
win10v2004-20231215-en
General
-
Target
farlab_setup.exe
-
Size
1.7MB
-
MD5
a7703240793e447ec11f535e808d2096
-
SHA1
913af985f540dab68be0cdf999f6d7cb52d5be96
-
SHA256
6a17ebf5da6aa3a1f4813e5f46fdd5d19d026bcfac91f232359f98e43df3c38f
-
SHA512
57bdcdfcfa11f6b5bf4149be0fee0444fcf67ccececf1009b166b17b7dce30da1a472f1890736186f4ef76e02ed23cc0dd2a41dc9bff94218a059832d4b5c69e
-
SSDEEP
49152:C9CKxz5eM8JvooqXrFzYA8hVU2AGm63yjpGIcLJjmyGpf8:MCm5eMOooqhomhjrcLS8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1968 farlab_setup.tmp 2728 farlab_setup.tmp -
Loads dropped DLL 8 IoCs
pid Process 1044 farlab_setup.exe 1968 farlab_setup.tmp 1968 farlab_setup.tmp 1968 farlab_setup.tmp 2180 farlab_setup.exe 2728 farlab_setup.tmp 2728 farlab_setup.tmp 2728 farlab_setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 farlab_setup.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1044 wrote to memory of 1968 1044 farlab_setup.exe 19 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 1968 wrote to memory of 2180 1968 farlab_setup.tmp 17 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18 PID 2180 wrote to memory of 2728 2180 farlab_setup.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\is-6Q4JK.tmp\farlab_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-6Q4JK.tmp\farlab_setup.tmp" /SL5="$4014E,1570064,56832,C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe" /SILENT1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\is-6B1BH.tmp\farlab_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-6B1BH.tmp\farlab_setup.tmp" /SL5="$5009A,1570064,56832,C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe" /SILENT2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
Filesize
361KB
MD5aaafdc8e47c74909d5ea857feb5d61d7
SHA1db756576a7b841edd091f94156b8a0cc0b84d972
SHA2565132ab0474e824bb39578647906d64076c4ec4a87d08b56b038f67c51d10ba25
SHA512f5b7ec7f9e82bc0baedfb03d6c99de1648cac9d9e52a15a0fed29bd33bab451004f09f77039829fceb51429cd86ac47389a935eb23a670ddeb7465b3386ebe00
-
Filesize
264KB
MD5d2f28473aa815218c24d45e11c03b3ab
SHA143677d1d8fbbe2a74ca4dc27a2e564ae0fa05b9e
SHA25699362f571b67c4926f80d8d1ccf899284d05849c63e2d41aa4fe70d8192e05c9
SHA512110548bb405c949824453740dd94d1c014ed3dec5c65844b758e90aed264b45ca7dae2243f8cd0f3f1271bcf5ce802d7b696509637a5e15f2b5691d377390ddd
-
Filesize
13KB
MD585ea9e2916b47b7a3c3410dc897d4523
SHA1e128a6d93f5b41f8a6f91972c2d3975549c199bb
SHA2563557e8c19aa948b87e0eca7680be55e7e77ea6f4ca85eaec1642b4a03fdcfb8f
SHA512d9ed5878b9c8f3d61626e9d888a3db17740667f58674211e545cb20a54e7d180caf6929d46fa0af75827ca076120c9a03a901049ce104be0d091ba0aca379cbe
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
201KB
MD59ae962a91bd121476279874a04ee4cf7
SHA1989277b8ae40b8dd093355a280c924b9a9325b9f
SHA256b23585f84a28261ea718e40ed906a1f3a08a9d295312fc40e581b8434d2b56b6
SHA512f887ef2c5e56464391109ea973bd7453b58dd616589fee152dee26c47e4f81f6b0b08806afe4b6d03e2247a17541eb53b99876aa897cdecd37d7c712f78e07b5
-
Filesize
165KB
MD50e2c8f52cc8c422256ce8e85bc02b87c
SHA17985bd5fc479f907d5e202ccec81fb0c0d598537
SHA256d06ee8f7e2bd27ae8e6bfc0e1f7ee4b7dd7f196dc0ecb2da5acd1f3825deb570
SHA512b1cac91309bf5ff2fbddb089d5f802876b581e5f72704426034159856fcdd676709ef3566124555d831052470e4822a7e2c5aaead3b7738bbd316f8c4d505d4f
-
Filesize
5KB
MD578d3e17a86e82c15e14f52a5812291ac
SHA178cda7755c1d2444675114a725b8b9dbe7184e07
SHA256a42ab7bbaefd9c21a60f088c12cf52807b0cfdcdb2d0e251668695030a8c5e80
SHA5125501f2242d1af5ef2ed2a7988de6f046e0addb0c7ea45ad93f38752247cf35342b10d8f2de46128f6a6ee4569b8f3a3fbd29ca225ddece0b6ea5083aa95d14e3
-
Filesize
95KB
MD52497620fa4e61df6e43b707c720beafc
SHA1ffbd502fc4adbf92be55581638734e235bc93816
SHA256ef3f3fa04d82f498fb68d4eff598fdef71a2efda7ead9f3ed52c14238ff23c8f
SHA512b79b8f82c691d818ef8b2d9e4629e9ef2690f0c8d66eeb0b65485d21f2914f7d45628fac64b9e15237f844f5bb57d462216a53f33d31e7e03035bf00ce982b0c