Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240221-en
General
-
Target
Setup.exe
-
Size
2.3MB
-
MD5
5d52ef45b6e5bf144307a84c2af1581b
-
SHA1
414a899ec327d4a9daa53983544245b209f25142
-
SHA256
26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616
-
SHA512
458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48
-
SSDEEP
49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1284 set thread context of 3024 1284 Setup.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1284 Setup.exe 1284 Setup.exe 3024 netsh.exe 3024 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1284 Setup.exe 3024 netsh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1284 wrote to memory of 3024 1284 Setup.exe 28 PID 1284 wrote to memory of 3024 1284 Setup.exe 28 PID 1284 wrote to memory of 3024 1284 Setup.exe 28 PID 1284 wrote to memory of 3024 1284 Setup.exe 28 PID 1284 wrote to memory of 3024 1284 Setup.exe 28 PID 3024 wrote to memory of 2488 3024 netsh.exe 32 PID 3024 wrote to memory of 2488 3024 netsh.exe 32 PID 3024 wrote to memory of 2488 3024 netsh.exe 32 PID 3024 wrote to memory of 2488 3024 netsh.exe 32 PID 3024 wrote to memory of 2488 3024 netsh.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2488
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD5dfe82888bb003d59ea8fdc5622aced17
SHA1bad283644426b5dba53f7d56471ad2d355e91da5
SHA25617ae9a789329320e91358fd3e1fb569044e011db0c1c47d25be6cb9725d9b301
SHA512ae71c1da54e771d6dc10f827b6adca0f664fb9b2ced0be20fe0650b64654b9a7c966c8fa5314b0d39f7647a915ff36fa069520e4e7cd8b36ff24b444eb143bb0