Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
ba3a4454371bf863c17d9f0c05b58d70.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ba3a4454371bf863c17d9f0c05b58d70.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240215-en
General
-
Target
setup_installer.exe
-
Size
4.0MB
-
MD5
5118ea744a34092421a36471432b1231
-
SHA1
8b08c5a40eff8fa39fe1819b4a06a0405e228600
-
SHA256
a07170f47dc2c8a226685a32227afc22b87ff6197bc880c5c351376304bf3434
-
SHA512
238ab1c76b65a89a237165e641543f9e416fc9e24d8f536459eacb1fd4500e9b8337c54201e33c84ed384d14633c6493103547a8db137eb9c19fd6e8e1a22ccc
-
SSDEEP
98304:x9P2x7Xmil1mBbgoXAusjzxFmt7V40/hD28ndCvLUBsKciW:x9P2xLmi6OoZoIXSLUCKciW
Malware Config
Extracted
nullmixer
http://watira.xyz/
Signatures
-
resource yara_rule behavioral3/files/0x00060000000173e5-15.dat aspack_v212_v242 behavioral3/files/0x0007000000016c8c-28.dat aspack_v212_v242 behavioral3/files/0x003600000001654a-32.dat aspack_v212_v242 behavioral3/files/0x0007000000016ce4-38.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2596 setup_install.exe 1604 sonia_1.exe -
Loads dropped DLL 21 IoCs
pid Process 2484 setup_installer.exe 2484 setup_installer.exe 2484 setup_installer.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2596 setup_install.exe 2448 cmd.exe 1604 sonia_1.exe 1604 sonia_1.exe 1604 sonia_1.exe 1604 sonia_1.exe 1604 sonia_1.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3052 2596 WerFault.exe 28 -
NSIS installer 10 IoCs
resource yara_rule behavioral3/files/0x000c000000013ab9-62.dat nsis_installer_1 behavioral3/files/0x000c000000013ab9-62.dat nsis_installer_2 behavioral3/files/0x000c000000013ab9-68.dat nsis_installer_1 behavioral3/files/0x000c000000013ab9-68.dat nsis_installer_2 behavioral3/files/0x000c000000013ab9-69.dat nsis_installer_1 behavioral3/files/0x000c000000013ab9-69.dat nsis_installer_2 behavioral3/files/0x000c000000013ab9-67.dat nsis_installer_1 behavioral3/files/0x000c000000013ab9-67.dat nsis_installer_2 behavioral3/files/0x000c000000013ab9-66.dat nsis_installer_1 behavioral3/files/0x000c000000013ab9-66.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2484 wrote to memory of 2596 2484 setup_installer.exe 28 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2448 2596 setup_install.exe 30 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2480 2596 setup_install.exe 31 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2524 2596 setup_install.exe 32 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2572 2596 setup_install.exe 33 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2916 2596 setup_install.exe 34 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2460 2596 setup_install.exe 35 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2596 wrote to memory of 2348 2596 setup_install.exe 36 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2448 wrote to memory of 1604 2448 cmd.exe 37 PID 2596 wrote to memory of 3052 2596 setup_install.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\7zS4B969A36\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B969A36\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\7zS4B969A36\sonia_1.exesonia_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe3⤵PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe3⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe3⤵PID:2572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe3⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe3⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe3⤵PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 4083⤵
- Loads dropped DLL
- Program crash
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
542KB
MD5a21ca51f0c67a137d7a021130568b892
SHA169206b25e7ea6000910711a45765eaabf8123824
SHA256652db0e33baeba677afd78714bc7438eb06a47d7ac73a42f3c3303279f35f8b7
SHA512f64da29ae829c89676ee6198812111095580764d36a9d0e7fc5d36a7d2e8b45d5ee4440dca387e3548dc725ad5a812ddd96cea29f1b1a778fb1284da71aefab3
-
Filesize
693KB
MD5dae60cf2a2873b629aeed7e67f028cad
SHA1eb8b64102a96dd871e8c1e00b2b34df506027d7d
SHA256d5314658c50fde24db3cc70e173e206d0b673718061c1850355c8866e82ea6d1
SHA5123c7397ab8bb72c53d184013841c0c2d3644498dc99bd47878281dc87c6ff40b78891f97e1245fe9224986ba51b9495cdb157992c6df4fbe013787498ad747957
-
Filesize
497B
MD5cfbd6c18c1a5ed97b4df0477f3a13113
SHA16d1a44851bda084f46494b18c3fad8ceadbbebc6
SHA256fcd022709e50c757464147cd690321a19ca9e5c07e4f8c06d22054c7c4e9ba08
SHA5129d8e9efe5fddfc22425d025b025e0a00471831a11ee7db0876de1f7c829023a8ce5c8b90812bbccddcfe76806af4570bd9002f0171709cf786a59971dd54a8db
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
290KB
MD5c9e9c8cd25c436b7881670c3b5e68350
SHA140489fcb73ec92f9f553a5819f3787002efdea33
SHA256fd71aa3bd511a44f4ae2995df89d5f5eba6e8473bc275efb8562f14081d2e689
SHA5120f41d41c6c4aa3431f023b0c8de646f3de9b5368f862a11101c1b2461e9c732443b8daedfe4df910f942cf3907d3e90747b4466e573577eaac043f3b26a2b9c0
-
Filesize
421KB
MD5f2302f3670f423ed26c8a13c8bc49752
SHA11ce872ebe5aad5971eb4d9edfb5c7fcaf747c35b
SHA256571c80b855b6c7441d48574e06279359ab416226a5f5dc765f4b0a4863d40ec0
SHA512ad4ad653dfcbd45c1b8095140346b36ca4733374ba869d17872435189e114fa93e049743556afe5f644431d2338a9c71bb2040e54c2d54b21c2fea4d29f6e220
-
Filesize
688KB
MD590f0212292de0999c0bc2fe479f1beba
SHA1ca37f5f5d4c0e5bf2431ba24b7afc3516a23444f
SHA2562346495b1ff0d4665721feb7985baf47be80b6df553a81517d7ca61f6dc0d537
SHA51289d960c2f2097fb4a8f778021754880df1dde981baf1bd20b26688f011fe21be1af6db6a91da966f02efe317b19fae299394e87c1dfc31b6ec0d4cceab6dfa0a
-
Filesize
620KB
MD51afea0ace25ae2619b68630dc8f1f0e8
SHA10526eff8bab0558e68fab5025bc2a14c003293bd
SHA25601a36e57513bebebc10732a54b140d27239aef07f7fbe1a41a54582b39173091
SHA5127deb49600e47c5163e89ea25901191b8b0167e05089ec589c987f3567cd6e84e59f607af60dce482ef4fa5abca9727717790d54c778dac332036b571756ea9a0
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3