Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 03:45

General

  • Target

    MainInstaller.exe

  • Size

    531KB

  • MD5

    9ce448dcd7cf13dd950725957361bdff

  • SHA1

    5831ff31825ea82d90a2989e0fc0a33b859d5f97

  • SHA256

    3dbc5aff076ef9c86a90ad30e963581f7cb22f8e212aa38db29d82cf45b73f80

  • SHA512

    b4a175da3677cd3380cb3789f281f2afb10aa00dc9592217062d66eb9b5e73805886b692975d7244cdd439d8d5bcd0eb5810533284ba4b13ff02a20b792bf74f

  • SSDEEP

    12288:z/8Ze69hm2S17Y/bv9VXXLVS+n28L6OdBCZrrf3xSEowuj6ZQM7gMWZQkN:zihc17YpVE+PGsB03xSEowuj6ZQM71WD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MainInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\MainInstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      C:\Users\Admin\AppData\Local\Temp\Setup.exe /PID=0 /NOTIFY=0 /FFR=1 /FFP=1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe

    Filesize

    470KB

    MD5

    94b4f739561530b4edcc669ebb658a15

    SHA1

    0e5ee26d2f942548dbf5f0d0b27a3336166292ef

    SHA256

    b0ddc3d7bf1da2782e17e611c86af090241f088201afe15d0e78b5b55c420111

    SHA512

    d9cf78f93c020c814037ff600503744374e93d24bb2f128f0a112a971d666389dd0991f1fe9039145e0d0c9f3b93598cc7c8cca77c9874dabd2409a35a9f4e98

  • C:\Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\ioSpecial.ini

    Filesize

    707B

    MD5

    20536d4885244d7af3b3def4f7cc55b4

    SHA1

    254941faec6ff152c94ac6c9cde4cc32d620b555

    SHA256

    1aa07fb3a4c263c3b635e31ec726deae1c7c686fd3d8c8e60fd6428646492188

    SHA512

    a6b311c79b047b8f0321e4ce5099ac43fc0ce52e3a940f302acc349bc1dd5977f8fe23043a280337526459f93ccb5c153f9df8b09b27bfc34b86a06c14a11e82

  • \Users\Admin\AppData\Local\Temp\Setup.exe

    Filesize

    505KB

    MD5

    5d8d0c08384ad73216d52a2eabc064f5

    SHA1

    0fa5c77fd6b6323b926c9648679e063d1bbc8bcc

    SHA256

    30522715240f4a05859099ac370dfb516097ab257402981c6a9ad31951f36cce

    SHA512

    42a3003019e39622082506c7ae50d8a27e2920fdfdf15eb9a8dbf7f1dbd49a02cd0390dabd74c136ed44e9d8ba270540ce9390f31aa84c2fc9fdfcc9e912dd57

  • \Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf