Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 01:56

General

  • Target

    setup_installer.exe

  • Size

    4.0MB

  • MD5

    5118ea744a34092421a36471432b1231

  • SHA1

    8b08c5a40eff8fa39fe1819b4a06a0405e228600

  • SHA256

    a07170f47dc2c8a226685a32227afc22b87ff6197bc880c5c351376304bf3434

  • SHA512

    238ab1c76b65a89a237165e641543f9e416fc9e24d8f536459eacb1fd4500e9b8337c54201e33c84ed384d14633c6493103547a8db137eb9c19fd6e8e1a22ccc

  • SSDEEP

    98304:x9P2x7Xmil1mBbgoXAusjzxFmt7V40/hD28ndCvLUBsKciW:x9P2xLmi6OoZoIXSLUCKciW

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS406F4957\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\sonia_1.exe
          sonia_1.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_2.exe
        3⤵
          PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_3.exe
          3⤵
            PID:1136
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sonia_4.exe
            3⤵
              PID:3848
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c sonia_5.exe
              3⤵
                PID:2932
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sonia_6.exe
                3⤵
                  PID:4784
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c sonia_7.exe
                  3⤵
                    PID:4972
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 560
                    3⤵
                    • Program crash
                    PID:2268
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2732 -ip 2732
                1⤵
                  PID:1176

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\libcurl.dll

                  Filesize

                  218KB

                  MD5

                  d09be1f47fd6b827c81a4812b4f7296f

                  SHA1

                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                  SHA256

                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                  SHA512

                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\libcurlpp.dll

                  Filesize

                  54KB

                  MD5

                  e6e578373c2e416289a8da55f1dc5e8e

                  SHA1

                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                  SHA256

                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                  SHA512

                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\libgcc_s_dw2-1.dll

                  Filesize

                  113KB

                  MD5

                  9aec524b616618b0d3d00b27b6f51da1

                  SHA1

                  64264300801a353db324d11738ffed876550e1d3

                  SHA256

                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                  SHA512

                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\libstdc++-6.dll

                  Filesize

                  647KB

                  MD5

                  5e279950775baae5fea04d2cc4526bcc

                  SHA1

                  8aef1e10031c3629512c43dd8b0b5d9060878453

                  SHA256

                  97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                  SHA512

                  666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\libwinpthread-1.dll

                  Filesize

                  69KB

                  MD5

                  1e0d62c34ff2e649ebc5c372065732ee

                  SHA1

                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                  SHA256

                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                  SHA512

                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\setup_install.exe

                  Filesize

                  290KB

                  MD5

                  c9e9c8cd25c436b7881670c3b5e68350

                  SHA1

                  40489fcb73ec92f9f553a5819f3787002efdea33

                  SHA256

                  fd71aa3bd511a44f4ae2995df89d5f5eba6e8473bc275efb8562f14081d2e689

                  SHA512

                  0f41d41c6c4aa3431f023b0c8de646f3de9b5368f862a11101c1b2461e9c732443b8daedfe4df910f942cf3907d3e90747b4466e573577eaac043f3b26a2b9c0

                • C:\Users\Admin\AppData\Local\Temp\7zS406F4957\sonia_1.txt

                  Filesize

                  3.0MB

                  MD5

                  4bf2b8f4b46385bfda4d65e423cfb868

                  SHA1

                  6a3d20796e1fcd4169d5d339af6e491dcea3367c

                  SHA256

                  49aa06eaffe431f05687109fee25f66781abbe1108f3f8ca78c79bdec8753420

                  SHA512

                  18f12d78316da2210a7cf0506c6f2e6d1634800697e5bd60bd402597f5cc590f96f97e42878caafae3f3bc12807b715a64aa6a81f8b5ece6343cebd2a4066375

                • C:\Users\Admin\AppData\Local\Temp\nsl6227.tmp\InstallOptions.dll

                  Filesize

                  14KB

                  MD5

                  d753362649aecd60ff434adf171a4e7f

                  SHA1

                  3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                  SHA256

                  8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                  SHA512

                  41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

                • C:\Users\Admin\AppData\Local\Temp\nsl6227.tmp\System.dll

                  Filesize

                  10KB

                  MD5

                  56a321bd011112ec5d8a32b2f6fd3231

                  SHA1

                  df20e3a35a1636de64df5290ae5e4e7572447f78

                  SHA256

                  bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                  SHA512

                  5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                • C:\Users\Admin\AppData\Local\Temp\nsl6227.tmp\ioSpecial.ini

                  Filesize

                  497B

                  MD5

                  742ced33308fc7d4cdda0d1ed5384051

                  SHA1

                  22fda8c5f53ff7a51ae1267806c99306e5a56826

                  SHA256

                  1aaa9558235457b7f8f4531c609c55d202f59acc24d01f0cda47dafb238f1731

                  SHA512

                  bc7aae1c1df31bd913f6cd3756b7fa4cfdbd15af1cbdda0e3da8e72d95888c19cba621ae128dcee166854e56b1ad619e66102cf37eccf3715850b22e28b1fbf4

                • memory/2732-37-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/2732-50-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-38-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-42-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-41-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-40-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/2732-43-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-44-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-45-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/2732-46-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/2732-47-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-48-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-49-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-39-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/2732-51-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-52-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-36-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/2732-34-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/2732-35-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/2732-20-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-144-0x0000000000400000-0x000000000051D000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2732-146-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/2732-145-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/2732-147-0x000000006EB40000-0x000000006EB63000-memory.dmp

                  Filesize

                  140KB

                • memory/2732-148-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/2732-149-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB