Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
bwyysetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bwyysetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
bwyysetup.exe
-
Size
2.4MB
-
MD5
8dd80d04594f91926c7f5ad835ed9597
-
SHA1
5fd73ce5d98ae253d871ef2fda9fd94a20e790a7
-
SHA256
50ea0b1ddf1a111cd2af55fef4f69907001c901152041e4de808f5240c6dbac2
-
SHA512
2f39eb7b35c887459515ef6ba004677f00740defff166048cdb1d0954d76d4f370d1335352733f12d91f87ee9f2c5a21df8f8fd882ac431022e1f6e205ede291
-
SSDEEP
49152:kGhoGNvFYvXCFRPuMOCmQgQICm8A1VasjE+iEujy3xDE4VHmEa9xD+pS:ZhoGAs8MOvnaiUsjTiEujiDE+GEa9xJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3388 is-NKTSL.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3388 2720 bwyysetup.exe 88 PID 2720 wrote to memory of 3388 2720 bwyysetup.exe 88 PID 2720 wrote to memory of 3388 2720 bwyysetup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe"C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\is-ATUG1.tmp\is-NKTSL.tmp"C:\Users\Admin\AppData\Local\Temp\is-ATUG1.tmp\is-NKTSL.tmp" /SL4 $70064 "C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe" 2274069 512002⤵
- Executes dropped EXE
PID:3388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD5b648dcea8917936fb4eddbea705ac5b4
SHA1d78a35c8bae12e63aac254250f1e0ace1a1f296a
SHA256af8f25091dea9d69bba24be8ed54ae8d5bb9d48fcc1467a80d4b0a161c585e82
SHA512e333271ed2a541db8fddd4a3b16b87ff4db923658bff7d703ab3d372cc857c6ade043abad6285584425c17610bc5587ef1477ca66a79c9412a3244856d2c8cdc