Analysis

  • max time kernel
    111s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 07:52

General

  • Target

    setup.exe

  • Size

    785.0MB

  • MD5

    6755776d1f19b3ed3ec620031c2e81da

  • SHA1

    96b6f2998ec6af205710e00f5e40beb727d440c3

  • SHA256

    699324d2d1bf2a07e459d770a2afc8ba5e0e5e34431647cf8aab656f548921bb

  • SHA512

    e13765b95290f1c13e52415d0041bc34e4ce36aeb164d9ff2ba11e811d3eedc31375798d35c114ac1b0932c8fa8f88e6ca8cd13a5dec2f927bacd0499c3b4429

  • SSDEEP

    98304:CcQJYvdLPMWB3hQaxefY7BqlWRrA8QixQiiorKRf:CcQJYvdDnB3iaxew7slWZCiicKRf

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies system certificate store 2 TTPs 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    PID:2884

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a887f337689c6ac5b431ac36f61077be

    SHA1

    e7b35c5cd5172cae5a3220f05ab979cc86235005

    SHA256

    c6e7320c43d16da3318fd4476d41cb4589ec1006fde541473a672013b20a41a7

    SHA512

    b59b20412077c7b659a99c34fc0f7fc22d262e505611c60d6082f856f2e606182a9eea836ccbb350422f6727a6e4ee939e240ecd9b9a91afae9a1acb1bdda73f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    50db928ee73f3db0918b647202fd5585

    SHA1

    43854f21d096292b351e62c0041ee1b7d949f8df

    SHA256

    8d033b41f81282fa256db587f615f1b26cf6354856feabd0d3b3702e673a80c1

    SHA512

    b2b234118c11a8dd917c2ff1565b5f4e71c28216712e28af6ffce8ae3a13f6973d4d53a59a5d0b552bebd434f35bc7bbf593405fdcf2d278449ed757d2667c70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    df9c784a1a768fbfb66e0d5360534abf

    SHA1

    451930db6c8b290b8f4abd66d1f14325a8e4b7f3

    SHA256

    ce2203fa9f720c7b72aca13491caa75556f0c8f0b75c63f2b6047eb45c8f68a1

    SHA512

    2803d62e8cc276766d7a36721bb5fde7e4eb69a47f682bb3e39fdbfe6fbc786abbd587258354d88998310c6f121302b6464e4df099844b54370938e540402812

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    66697f003c459a95c690604985eb0886

    SHA1

    543aa139ec508aa541111a8efd59638d3c5f6bf4

    SHA256

    c840aa84fb5bbc1fddcb10e538d2b601895b279e432dd140342e9c78548bf21c

    SHA512

    dd16988624d9ea3a7ba88d92f70b1af291ed6e94fada89c7566d2feffcb6873ba5f8b4ccef0250031245f2e541c53b7508a01b3467f509d178864f63b26ca8e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c6db88a831cd2a041e949755a3541d73

    SHA1

    5a1f7c5d7914292fa0c0fa151fa63db62195944a

    SHA256

    733374324ecaaeacaa4454aa1035d128f3a2edd3bbce599a5d3947aa1b529e15

    SHA512

    f975041b53919c58be71f4bcec980b722bfd7667bf442c934cdc068fa6fad76cf91bf4b2557fe418a631f242216eefd5ce9e22af8399456c83ee3200bb641a96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    20cd305b4d2bc69668c09e4bea2e5819

    SHA1

    b144b61875ed7c2efdcb27ed9f847f3d29dc38b7

    SHA256

    f2ad5f5d9a1715da501ac0113c115d7049593bd97507703ff49d42e50327744d

    SHA512

    d436eea3b3832f188de2110aabfbb17af0ac241f9b89cf64a8d194a7c01b1111dd901a3ce81e9f147ab1bb3afbaffa554e346fa6d6791b5c13c2433580645a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c3a098da589011f73449c02da7f0541d

    SHA1

    3ac6a0d9dc00a5793159a80744e90988da542352

    SHA256

    57e10897f6ca2e360c95bb9ed42b8846312d4325d1916276dfc5c6de809abec7

    SHA512

    131c197254fb5b8005d9312eb940c5e43985399ba2435ad16e62d74003a99f21e7813a0a44f22bc849c6343a31a894fedf2cab7b3d071dc663693f621e7576f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7ec1bf829eee60f6ccea4a345f1b5097

    SHA1

    7501c8faed87c555b924346e5b8bba9c71eeba7a

    SHA256

    f70e52a3cfe762bd1d09732af0161679297995b98752971e23166afd601ddac4

    SHA512

    b23d91fd44024ba214065180a16c723037d3e0bf137a9719509f6a6283de718a9a6c37f88748cf87fbbee6ebae387a1a0ab3f2d7f61d63a8c5f426a4a12a3da2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2395c8c201d6068ddbaec3c7c41df0e2

    SHA1

    1c3f3b33e3ba35b97db3e78cc6ad80682d58eb26

    SHA256

    adacff1c6dce90b699b19fd5bf8163393484e7ccc1868ec4f1c60305ea802c54

    SHA512

    242425c65d37cbcc5d0d8a7c7d0d23d4496ec08114957e9bd762a4cdc5e36e3b4601ddd1c0831facaf6f2672323fb6bf3d6fa2ba14b1906dcb67fe57be393dab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    1082324d5a7218ee1f5e9f9598238271

    SHA1

    4c810c133378949f8a89f1241cef9302753080ec

    SHA256

    db94b25d3498dde9ba7b61779fc527351e856dc59282195761c975890c7c1178

    SHA512

    04edd3720e95f726fa0de7316ccbb05f6532be9ff5e9aa282bf8436cca91761fddb4364ee512ddcdaf38539ef504ba9eea9b682a9b622186724f5690b0f9f764

  • C:\Users\Admin\AppData\Local\Temp\Tar2976.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\Documents\SimpleAdobe\1KtHMPxR8STcQZ9gexX_pH4o.exe
    Filesize

    954KB

    MD5

    53b6682554c16698ea58a5fd6d2cc540

    SHA1

    7c5e0618b56b323a8492da4b76ea817062a64fa1

    SHA256

    808664281424bdac3e854a673ae81a897b17668d4d4e61f9899d7bf6d51a2acd

    SHA512

    ba8c3458a1bc2a4e502ef353cca984477db717fbf2bc1b5884d6eb9050a69e25b4d7aef3e47643e020a166c02bec3ee4d9a1681a4f9e73c793f1a61d13e78051

  • C:\Users\Admin\Documents\SimpleAdobe\F3v3D_xZoYCDe1lsmdRbeYc4.exe
    Filesize

    2.7MB

    MD5

    197d11af40e62f2a072e0ee41cbcda3f

    SHA1

    c15d0010a5aacc9d93db9fd2a250021280fa31f4

    SHA256

    7655096c77fe4bbe08def021db34e8029a433a3db2864a395030480aeb3d973c

    SHA512

    6524c5d9112b32ca125cb0079c53ec9926c35fe6101ef604b743937807815056b92a80e6f131d36a116a67143d1ac8559106f7f97bad4ad78e3f46a42fa352c5

  • C:\Users\Admin\Documents\SimpleAdobe\GZs7nfSE0I5p2cknBrpRvGmN.exe
    Filesize

    78KB

    MD5

    efc57ed49a29d9c43f780ac57d9383ea

    SHA1

    6feb772dab15a7004cccefd6e77aa47cafbb89ed

    SHA256

    12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749

    SHA512

    37f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3

  • C:\Users\Admin\Documents\SimpleAdobe\JdJlRd6q9RAzguNDGEG9qR0h.exe
    Filesize

    284KB

    MD5

    ede700c4b78c5bcb0be545399bec860c

    SHA1

    2480bc3366fa1532fa9b778baf74917229b5b415

    SHA256

    967258793f93f066a87dbda437c3f5f541e4591675e29e286c39c91fc6688e56

    SHA512

    0d5cf9f3c4d71c27e1e6b266e900c82bab8bb191c88b360a6a1aad21fce8ff5ac58368e5fe875ba885ffaca2e331f9ea5a761bd4aed54a15be967cb9995ee13e

  • C:\Users\Admin\Documents\SimpleAdobe\QTjcwzyXGLsYjWIBe9IjtLDB.exe
    Filesize

    8.0MB

    MD5

    3a7443e4c9b1801d4372716f4ceaaf2d

    SHA1

    3894a6635679c79f00c645bc22d7f46527d1ade0

    SHA256

    51d032730b0ac18425d69740f1d541bf91e3f912d2ff915ef07d47f9b55fadb6

    SHA512

    bf52cea30bb511b1e8f7629136bc785327d2e741dffd9bffbb7d085be7c0540c5f9ebf297fbb1cfc01b9b3efd28c9510833f0a82577ccf3060093560ae14f729

  • C:\Users\Admin\Documents\SimpleAdobe\XUbKMseW8dEXcbY7gZrXfPtW.exe
    Filesize

    2.8MB

    MD5

    7f1e688e77760ad29c560404a2fb9d2f

    SHA1

    7c06e05c8e13d01df26653cbe12695af139c5854

    SHA256

    086bcb65380fa0e4d23c07fbff58863949f8158b87d07cd6eac6485d99b3bf0d

    SHA512

    e841524c36ec9f550bbd299fbd33bbf15587dde922c747ae719bea03c387e62bbb9a73fdee0188dfb1586cca5b9dc81745144e633ed3dcb661434ab1c87e393e

  • C:\Users\Admin\Documents\SimpleAdobe\f_G8nsOEKZjsHiLre1UKPvQ9.exe
    Filesize

    4.2MB

    MD5

    e30504e89f111a4003523547709abd18

    SHA1

    a7fbeeff802197a2544026e2718c8f7c211cfa01

    SHA256

    960ba0887cf5903bfc5d17e74447a1ddf4d65d7f0737e7152831893f9cf087b9

    SHA512

    30e3adf560fc74ef8b86c923c298223f146a601b60fec02071735f29d4ca7cb1ed51a44132bc664baf7e17edba0a9ce0a9291aa56ae11d3c7d40ded75344cf88

  • C:\Users\Admin\Documents\SimpleAdobe\kcAaY9rBHYtZ_r14B2VbTKxz.exe
    Filesize

    4.0MB

    MD5

    d72b925c4abaf97c5eb47514ee82f7f2

    SHA1

    5768f62f599d2682b205f6beec17064f14e0646b

    SHA256

    7729b2ed03cca1153854c35ac85fd23c1e0d34347be0e29a8a6aecbba088a95f

    SHA512

    47c9a10df6edf8036e49c925bf13bdb2ede32a879428c29a6ace0cfd3d38323e2da7bd1c2382b4bf9a7342073244662e46ef558c9eeb57cc8e889c5edac6ef45

  • C:\Users\Admin\Documents\SimpleAdobe\n92ard_sEgk0MVkjL5KT0zm5.exe
    Filesize

    3.9MB

    MD5

    3d3075aa4abc4489df934dad9b4a103c

    SHA1

    b3f9d3db4238b8ea99cac1f47d37960d990d5daf

    SHA256

    ce660d99837075b4294a740355b73acd8d0854983e75159ae80334d1e8696d78

    SHA512

    0e60592dfec114675fd2c203e2b478079ff921807afb9556c053b3b76b8382b12f164f8cef6aed175658236fa333c9756d0e028caa487ec2f4e19afca3f8414a

  • memory/2884-279-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-0-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-8-0x000007FE80010000-0x000007FE80011000-memory.dmp
    Filesize

    4KB

  • memory/2884-13-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-577-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-578-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/2884-591-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-592-0x000007FEFD0D0000-0x000007FEFD13C000-memory.dmp
    Filesize

    432KB

  • memory/2884-593-0x0000000077270000-0x0000000077419000-memory.dmp
    Filesize

    1.7MB

  • memory/2884-12-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-749-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-10-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-11-0x0000000077270000-0x0000000077419000-memory.dmp
    Filesize

    1.7MB

  • memory/2884-9-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-7-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/2884-1054-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-6-0x000007FEFD0D0000-0x000007FEFD13C000-memory.dmp
    Filesize

    432KB

  • memory/2884-1066-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-1-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB

  • memory/2884-1076-0x000000013F190000-0x000000013FCE1000-memory.dmp
    Filesize

    11.3MB