Analysis
-
max time kernel
48s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup FG-X v1.4.0.4.exe
Resource
win10v2004-20231215-en
General
-
Target
Setup FG-X v1.4.0.4.exe
-
Size
14.8MB
-
MD5
cb9dd7c40b3159dd4a70b1b0a6dae6d4
-
SHA1
adb2506fde411708c5142c0359a4fff0e0c1a721
-
SHA256
2c5dfba9bc34286141fc295feeba6ef65ac5d67392698ade851387220844876f
-
SHA512
3092df51cba9964c8fdfe93556fd8b206676fa7cc8b7253f632959e7cd3c7b09564bf195efbb429659d2602fc116a904604f005ba461a171eda0929d8575d6fb
-
SSDEEP
196608:SVVGbcPRH906jrzAOTzuoRHCkXquI5fgw5rl5JDKxlRvsbFCte7Eeu2rcy1qtAJH:S0Uv08rR3plI5fnr1EcFG1y1qtAAA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 944 Setup FG-X v1.4.0.4.tmp -
Loads dropped DLL 5 IoCs
pid Process 944 Setup FG-X v1.4.0.4.tmp 944 Setup FG-X v1.4.0.4.tmp 944 Setup FG-X v1.4.0.4.tmp 944 Setup FG-X v1.4.0.4.tmp 944 Setup FG-X v1.4.0.4.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Steinberg\VSTPlugins\Slate Digital\Slate Digital FG-X.dll Setup FG-X v1.4.0.4.tmp File created C:\Program Files\Steinberg\VSTPlugins\Slate Digital\is-U02CI.tmp Setup FG-X v1.4.0.4.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 944 Setup FG-X v1.4.0.4.tmp 944 Setup FG-X v1.4.0.4.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 944 Setup FG-X v1.4.0.4.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 944 Setup FG-X v1.4.0.4.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 944 4896 Setup FG-X v1.4.0.4.exe 84 PID 4896 wrote to memory of 944 4896 Setup FG-X v1.4.0.4.exe 84 PID 4896 wrote to memory of 944 4896 Setup FG-X v1.4.0.4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup FG-X v1.4.0.4.exe"C:\Users\Admin\AppData\Local\Temp\Setup FG-X v1.4.0.4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\is-3NM3Q.tmp\Setup FG-X v1.4.0.4.tmp"C:\Users\Admin\AppData\Local\Temp\is-3NM3Q.tmp\Setup FG-X v1.4.0.4.tmp" /SL5="$A004E,15109403,679424,C:\Users\Admin\AppData\Local\Temp\Setup FG-X v1.4.0.4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD532f073b12097de32effc7b3738fd0f30
SHA129e18bc4e8cbdc430560b2dea88c6f69a76eb3e9
SHA256347dd65ed203014687a9f0c1a70240a169ceb512f5eea2f8c064e94dbc2b1364
SHA512b7d3dddc52d84f5c4529634244de8e3a4083166acd020e5f8444840186b23f117988e380cf4b1de9433bc0071c693f81d0350fda6b31181ca57a8ee19d8a0585
-
Filesize
357KB
MD5f30afccd6fafc1cad4567ada824c9358
SHA160a65b72f208563f90fba0da6af013a36707caa9
SHA256e28d16fad16bca8198c47d7dd44acfd362dd6ba1654f700add8aaf2c0732622d
SHA51259b199085ed4b59ef2b385a09d0901ff2efde7b344db1e900684a425fc2df8e2010ca73d2f2bffa547040cb1dd4c8938b175c463ccc5e39a840a19f9aa301a6c
-
Filesize
4KB
MD50f8bbab51c5f70093b7ed7dd825d68e8
SHA1a96809560b3e9001124083937a339cf2453a94c8
SHA2567fc4fa7f5cea34df0a6733527081886cfb1c49b369df2db454de87cc4e70bdb5
SHA5127b824ad5d7ec786535106d98bc80c9350f35ac2b76d7ee20163e90becf076dfeaca4732c0ecbe2d3d84a2efef337c380d5548ca0123e69e66e30bb396f0b9b81
-
Filesize
813KB
MD55f87caf3f7cf63dde8e6af53bdf31289
SHA1a2c3cc3d9d831acd797155b667db59a32000d7a8
SHA2564731982b02b067d3f5a5a7518279a9265a49fb0f7b3f8dc3d61b82a5359d4940
SHA5124875298d82037ef1fff1ee3c58a9059d8480274326c862729fcc56664ecb49e2692c3838948c66dc8336e4050469d831cbf1fbd79b66565ab673d2a67765109d