Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240221-en
General
-
Target
Setup.exe
-
Size
2.3MB
-
MD5
5d52ef45b6e5bf144307a84c2af1581b
-
SHA1
414a899ec327d4a9daa53983544245b209f25142
-
SHA256
26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616
-
SHA512
458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48
-
SSDEEP
49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 2228 set thread context of 2340 2228 Setup.exe ftp.exe -
Loads dropped DLL 2 IoCs
Processes:
ftp.exeBvInputDiag.exepid process 2340 ftp.exe 2244 BvInputDiag.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exeftp.exepid process 2228 Setup.exe 2228 Setup.exe 2340 ftp.exe 2340 ftp.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exeftp.exepid process 2228 Setup.exe 2340 ftp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Setup.exeftp.exedescription pid process target process PID 2228 wrote to memory of 2340 2228 Setup.exe ftp.exe PID 2228 wrote to memory of 2340 2228 Setup.exe ftp.exe PID 2228 wrote to memory of 2340 2228 Setup.exe ftp.exe PID 2228 wrote to memory of 2340 2228 Setup.exe ftp.exe PID 2228 wrote to memory of 2340 2228 Setup.exe ftp.exe PID 2340 wrote to memory of 2244 2340 ftp.exe BvInputDiag.exe PID 2340 wrote to memory of 2244 2340 ftp.exe BvInputDiag.exe PID 2340 wrote to memory of 2244 2340 ftp.exe BvInputDiag.exe PID 2340 wrote to memory of 2244 2340 ftp.exe BvInputDiag.exe PID 2340 wrote to memory of 2244 2340 ftp.exe BvInputDiag.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\SysWOW64\ftp.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\BvInputDiag.exeC:\Users\Admin\AppData\Local\Temp\BvInputDiag.exe3⤵
- Loads dropped DLL
PID:2244
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53364ddadce644290ca9460e9a65b79fc
SHA1e6e2921f04dd4c447c020a85e491674a9045f498
SHA25627876cf27483d7553be2e309c7f6cd89ded830c1a0b12eed846dde49ed5e3a33
SHA5128f97aecad618b85a62b95b1c0abf32f9b87cf2b8355f8e36d4e7fd3c93426e182a9ac93d8d33f7defb7193f17f1715f4b9fc5a75fbc2ca1a1367afdc50c7498c
-
Filesize
136KB
MD53d754cfa4a5b2a3f19720550acf6d3cf
SHA1e5c78edbd54e14a42258a6c223d2cf128530e1b6
SHA2568e5e627881c8182bfbb64601c6f4f7b30ba950dfd10f638f404479406b2c03b8
SHA51218db06443a718b8233ac9724e7f96310bf5841d2c980cd1d02e6fb6743e23acc13bd67fcd214b4c0650ac933f6f081759d699c73e14baf26ffc324c2b30f153b