Overview
overview
8Static
static
4Install_FSUIPC7.zip
windows7-x64
1Install_FSUIPC7.zip
windows10-2004-x64
1Install_FS...C7.exe
windows7-x64
7Install_FS...C7.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3MSFS.bat
windows7-x64
8MSFS.bat
windows10-2004-x64
8Install_FS...C7.pdf
windows7-x64
1Install_FS...C7.pdf
windows10-2004-x64
1Install_FS...ME.txt
windows7-x64
1Install_FS...ME.txt
windows10-2004-x64
1Install_FS...es.txt
windows7-x64
1Install_FS...es.txt
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 03:11
Behavioral task
behavioral1
Sample
Install_FSUIPC7.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Install_FSUIPC7.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Install_FSUIPC7/Install_FSUIPC7.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Install_FSUIPC7/Install_FSUIPC7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
MSFS.bat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
MSFS.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Install_FSUIPC7/Installing and Registering FSUIPC7.pdf
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Install_FSUIPC7/Installing and Registering FSUIPC7.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Install_FSUIPC7/README.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Install_FSUIPC7/README.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Install_FSUIPC7/changes.txt
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Install_FSUIPC7/changes.txt
Resource
win10v2004-20240226-en
General
-
Target
MSFS.bat
-
Size
4KB
-
MD5
590fa2ce71355aeb5607905509a140c8
-
SHA1
02d134061209bacf23efe744cfbf2aca1540718f
-
SHA256
b33f9b1a0f5cc34ba1dfb76855d0c6921f08298f942f9044d9868e74e285548d
-
SHA512
4cd3739bcd3afe957e61f540c7a9495e989ef707e1eee9041dc07b4dae45ac3469a0ba87ad841840c26f24caa35bb4c58ce3663a94ad44f42d38356a808effe4
-
SSDEEP
96:DNhEkndgsddddddddddhZ0C/U49l2ernfcRAN8:JrU49lJz0r
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 14 2464 mshta.exe 16 2464 mshta.exe 18 2464 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4404 4892 cmd.exe 87 PID 4892 wrote to memory of 4404 4892 cmd.exe 87 PID 4404 wrote to memory of 1068 4404 cmd.exe 89 PID 4404 wrote to memory of 1068 4404 cmd.exe 89 PID 4404 wrote to memory of 3532 4404 cmd.exe 99 PID 4404 wrote to memory of 3532 4404 cmd.exe 99 PID 4404 wrote to memory of 4080 4404 cmd.exe 100 PID 4404 wrote to memory of 4080 4404 cmd.exe 100 PID 4404 wrote to memory of 2464 4404 cmd.exe 101 PID 4404 wrote to memory of 2464 4404 cmd.exe 101
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MSFS.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\MSFS.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\cmd.execmd.exe /C start shell:AppsFolder\Microsoft.FlightSimulator_8wekyb3d8bbwe!App -FastLaunch3⤵
- Checks computer location settings
PID:1068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\MSFS.bat""3⤵PID:3532
-
-
C:\Windows\system32\findstr.exefindstr /bc:" "3⤵PID:4080
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Admin\AppData\Local\Temp\tmp.hta"3⤵
- Blocklisted process makes network request
PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e813d2bab84d0dde521a17981c6c99b2
SHA1d29873c490265d4f50f4ba5ed6472e22f28259a8
SHA25646243404b1bf5b18e584db02b175e2b8c0a8f93603c77e980aeae08ba761ffaa
SHA512d4719264562865700908a3fcf14b004d8957e94c9ed82db1b189efa31dab77998ffa40ffc95cba04ad819b2271a4a521c77d94ca010b5b5ce6df0e5944a1308a