Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
dtsetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dtsetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
dtsetup.exe
-
Size
454KB
-
MD5
079a93a6525a635ba73fcb1e57662dcc
-
SHA1
0c00d4c0e1534034701825c268bb6103e2d3c80d
-
SHA256
2501803bc42b23ab867c1ea8ae3bab2eba07cc8116bf36bd9b134cd3fc544605
-
SHA512
d45dfc1292ea253690618079bb59d4f3fbb1f36d445945da349d329663cd73e95cb10b45255cb55016b10bb27c7cf106851a76295c284fcacba064ce39a3957c
-
SSDEEP
12288:1mkOy6Q/bQGHlY0Cik8fru+XarFFoBadO4fdzrC0lKBfs3H+a:1fOy6WvHuHinZKrMBkf1nC0l803H+a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4976 is-EJNKM.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4976 4832 dtsetup.exe 87 PID 4832 wrote to memory of 4976 4832 dtsetup.exe 87 PID 4832 wrote to memory of 4976 4832 dtsetup.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dtsetup.exe"C:\Users\Admin\AppData\Local\Temp\dtsetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\is-AFRS5.tmp\is-EJNKM.tmp"C:\Users\Admin\AppData\Local\Temp\is-AFRS5.tmp\is-EJNKM.tmp" /SL4 $60230 "C:\Users\Admin\AppData\Local\Temp\dtsetup.exe" 113049 506882⤵
- Executes dropped EXE
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD5fa8621bfc44318a0e45e5a3414345318
SHA129de99e82aa87911d0761c95632ffec405164d93
SHA2566297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84
SHA512797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc