Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
ba3a4454371bf863c17d9f0c05b58d70.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ba3a4454371bf863c17d9f0c05b58d70.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240215-en
General
-
Target
setup_installer.exe
-
Size
4.0MB
-
MD5
5118ea744a34092421a36471432b1231
-
SHA1
8b08c5a40eff8fa39fe1819b4a06a0405e228600
-
SHA256
a07170f47dc2c8a226685a32227afc22b87ff6197bc880c5c351376304bf3434
-
SHA512
238ab1c76b65a89a237165e641543f9e416fc9e24d8f536459eacb1fd4500e9b8337c54201e33c84ed384d14633c6493103547a8db137eb9c19fd6e8e1a22ccc
-
SSDEEP
98304:x9P2x7Xmil1mBbgoXAusjzxFmt7V40/hD28ndCvLUBsKciW:x9P2xLmi6OoZoIXSLUCKciW
Malware Config
Extracted
nullmixer
http://watira.xyz/
Signatures
-
resource yara_rule behavioral4/files/0x000700000002323a-16.dat aspack_v212_v242 behavioral4/files/0x0008000000023231-24.dat aspack_v212_v242 behavioral4/files/0x0007000000023238-32.dat aspack_v212_v242 behavioral4/files/0x0007000000023236-25.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation setup_installer.exe -
Executes dropped EXE 2 IoCs
pid Process 2732 setup_install.exe 2944 sonia_1.exe -
Loads dropped DLL 11 IoCs
pid Process 2732 setup_install.exe 2732 setup_install.exe 2732 setup_install.exe 2732 setup_install.exe 2732 setup_install.exe 2732 setup_install.exe 2732 setup_install.exe 2944 sonia_1.exe 2944 sonia_1.exe 2944 sonia_1.exe 2944 sonia_1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2268 2732 WerFault.exe 89 -
NSIS installer 2 IoCs
resource yara_rule behavioral4/files/0x000800000002322e-53.dat nsis_installer_1 behavioral4/files/0x000800000002322e-53.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2732 1540 setup_installer.exe 89 PID 1540 wrote to memory of 2732 1540 setup_installer.exe 89 PID 1540 wrote to memory of 2732 1540 setup_installer.exe 89 PID 2732 wrote to memory of 1132 2732 setup_install.exe 95 PID 2732 wrote to memory of 1132 2732 setup_install.exe 95 PID 2732 wrote to memory of 1132 2732 setup_install.exe 95 PID 2732 wrote to memory of 2032 2732 setup_install.exe 96 PID 2732 wrote to memory of 2032 2732 setup_install.exe 96 PID 2732 wrote to memory of 2032 2732 setup_install.exe 96 PID 2732 wrote to memory of 1136 2732 setup_install.exe 97 PID 2732 wrote to memory of 1136 2732 setup_install.exe 97 PID 2732 wrote to memory of 1136 2732 setup_install.exe 97 PID 2732 wrote to memory of 3848 2732 setup_install.exe 98 PID 2732 wrote to memory of 3848 2732 setup_install.exe 98 PID 2732 wrote to memory of 3848 2732 setup_install.exe 98 PID 2732 wrote to memory of 2932 2732 setup_install.exe 99 PID 2732 wrote to memory of 2932 2732 setup_install.exe 99 PID 2732 wrote to memory of 2932 2732 setup_install.exe 99 PID 2732 wrote to memory of 4784 2732 setup_install.exe 100 PID 2732 wrote to memory of 4784 2732 setup_install.exe 100 PID 2732 wrote to memory of 4784 2732 setup_install.exe 100 PID 2732 wrote to memory of 4972 2732 setup_install.exe 101 PID 2732 wrote to memory of 4972 2732 setup_install.exe 101 PID 2732 wrote to memory of 4972 2732 setup_install.exe 101 PID 1132 wrote to memory of 2944 1132 cmd.exe 102 PID 1132 wrote to memory of 2944 1132 cmd.exe 102 PID 1132 wrote to memory of 2944 1132 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7zS406F4957\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS406F4957\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\7zS406F4957\sonia_1.exesonia_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe3⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe3⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe3⤵PID:3848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe3⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe3⤵PID:4784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe3⤵PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5603⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2732 -ip 27321⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
290KB
MD5c9e9c8cd25c436b7881670c3b5e68350
SHA140489fcb73ec92f9f553a5819f3787002efdea33
SHA256fd71aa3bd511a44f4ae2995df89d5f5eba6e8473bc275efb8562f14081d2e689
SHA5120f41d41c6c4aa3431f023b0c8de646f3de9b5368f862a11101c1b2461e9c732443b8daedfe4df910f942cf3907d3e90747b4466e573577eaac043f3b26a2b9c0
-
Filesize
3.0MB
MD54bf2b8f4b46385bfda4d65e423cfb868
SHA16a3d20796e1fcd4169d5d339af6e491dcea3367c
SHA25649aa06eaffe431f05687109fee25f66781abbe1108f3f8ca78c79bdec8753420
SHA51218f12d78316da2210a7cf0506c6f2e6d1634800697e5bd60bd402597f5cc590f96f97e42878caafae3f3bc12807b715a64aa6a81f8b5ece6343cebd2a4066375
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
497B
MD5742ced33308fc7d4cdda0d1ed5384051
SHA122fda8c5f53ff7a51ae1267806c99306e5a56826
SHA2561aaa9558235457b7f8f4531c609c55d202f59acc24d01f0cda47dafb238f1731
SHA512bc7aae1c1df31bd913f6cd3756b7fa4cfdbd15af1cbdda0e3da8e72d95888c19cba621ae128dcee166854e56b1ad619e66102cf37eccf3715850b22e28b1fbf4