Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 12:58

General

  • Target

    setup.exe

  • Size

    88.9MB

  • MD5

    81a23975d077e9b41b2353ad007a3396

  • SHA1

    8f9a233aa87b48ba1fdc485dd7e56046654f3b2c

  • SHA256

    532d208f2ab5eff34fa1fcefd6cbe6bfebfb0b509a375437301b83cbe42d8970

  • SHA512

    7c9d13480ec3927e39d7008f65f1719c1990d96fea8432da9fe59afaaca3ce8ef75aae13a190cb0a9bf2844e59795dabf27cafa37ff6cc98afc0d68ac690e174

  • SSDEEP

    1572864:dnq/qunYgEoPGEMTI9tP9IXjwENMWnnzEPEcXnMD6PXzdNlTFVy0+mgx1Uh:5q/quYaPGEMsr15EaWnnwP9XM0xTFVXV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\is-3JE0P.tmp\setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3JE0P.tmp\setup.tmp" /SL5="$7014E,92486863,358912,C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      PID:2476

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-3JE0P.tmp\setup.tmp

          Filesize

          1.3MB

          MD5

          fba82d74b4f471cccf4255ec72c0b51d

          SHA1

          dd4c4bf889f3482dc145a5b88733b9757df5a829

          SHA256

          6b1a4f2740514f6084e9fe6364494351899ec931a26bdd9597baf03469fe51ca

          SHA512

          2d5a42561ac1a986b69e3651edbd6fff36864f7a93dc56ead52caade27de8f1b730c79ea06667974ed2641231b18da6538618730c93fd88e6e0b5cc7f13f77ac

        • \Users\Admin\AppData\Local\Temp\is-OR609.tmp\ISDone.dll

          Filesize

          452KB

          MD5

          4feafa8b5e8cdb349125c8af0ac43974

          SHA1

          7f17e5e1b088fc73690888b215962fbcd395c9bd

          SHA256

          bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71

          SHA512

          d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc

        • \Users\Admin\AppData\Local\Temp\is-OR609.tmp\_isetup\_iscrypt.dll

          Filesize

          2KB

          MD5

          a69559718ab506675e907fe49deb71e9

          SHA1

          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

          SHA256

          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

          SHA512

          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

        • \Users\Admin\AppData\Local\Temp\is-OR609.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-OR609.tmp\callbackctrl.dll

          Filesize

          4KB

          MD5

          f07e819ba2e46a897cfabf816d7557b2

          SHA1

          8d5fd0a741dd3fd84650e40dd3928ae1f15323cc

          SHA256

          68f42a7823ed7ee88a5c59020ac52d4bbcadf1036611e96e470d986c8faa172d

          SHA512

          7ed26d41ead2ace0b5379639474d319af9a3e4ed2dd9795c018f8c5b9b533fd36bfc1713a1f871789bf14884d186fd0559939de511dde24673b0515165d405af

        • \Users\Admin\AppData\Local\Temp\is-OR609.tmp\wintb.dll

          Filesize

          16KB

          MD5

          9436df49e08c83bad8ddc906478c2041

          SHA1

          a4fa6bdd2fe146fda2e78fdbab355797f53b7dce

          SHA256

          1910537aa95684142250ca0c7426a0b5f082e39f6fbdbdba649aecb179541435

          SHA512

          f9dc6602ab46d709efdaf937dcb8ae517caeb2bb1f06488c937be794fd9ea87f907101ae5c7f394c7656a6059dc18472f4a6747dcc8cc6a1e4f0518f920cc9bf

        • memory/2168-1-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2168-36-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2168-57-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2476-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2476-20-0x0000000002190000-0x0000000002207000-memory.dmp

          Filesize

          476KB

        • memory/2476-37-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/2476-38-0x0000000002190000-0x0000000002207000-memory.dmp

          Filesize

          476KB

        • memory/2476-39-0x000000006B080000-0x000000006B08D000-memory.dmp

          Filesize

          52KB

        • memory/2476-41-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/2476-44-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2476-55-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB