Analysis
-
max time kernel
1172s -
max time network
1173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
SetupPoker.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
goldbet-poker.exe
Resource
win10v2004-20240419-en
General
-
Target
SetupPoker.exe
-
Size
961KB
-
MD5
4b7f817c7e63ca26090fc2c3603dc937
-
SHA1
5ec5c285ab8d3986edf1e74f0d8afaf7f3b44550
-
SHA256
5b79e006c00a5e8e621ad8cdba01491e5a2ec1f6e8500b02f842e7d5451b432e
-
SHA512
ad465a145bcc0d080d776c3a5de0ff4490b844116c0f772ad22cf7f166878b7bbadcc84bd53a59f92286157b44ea7aab8a8ab5461055ab11369491d95ec220c9
-
SSDEEP
24576:S8EBcrb/aIKxTj0odFPa/1JLJepfwoOlvlx:dEByiIS4ou/LJeRHOlvlx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation SetupPoker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2660 PING.EXE -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2676 SetupPoker.exe 2676 SetupPoker.exe 2676 SetupPoker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2960 2676 SetupPoker.exe 92 PID 2676 wrote to memory of 2960 2676 SetupPoker.exe 92 PID 2676 wrote to memory of 2960 2676 SetupPoker.exe 92 PID 2960 wrote to memory of 2660 2960 cmd.exe 94 PID 2960 wrote to memory of 2660 2960 cmd.exe 94 PID 2960 wrote to memory of 2660 2960 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SetupPoker.exe"C:\Users\Admin\AppData\Local\Temp\SetupPoker.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\26500.bat" "C:\Users\Admin\AppData\Local\Temp\WebInstaller_649D572D268044F6B2F240F5DDF21E67\""2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
Filesize
25KB
MD5d2ee49fe89d597bc7d6cf5f3812226f0
SHA136218cef3907f316c2a0a0696b1fc874a60755b1
SHA256b80815726c843bfb851139d6d286858bdb678337efb97637016e1b252c8994c7
SHA512a9031bb874fe19b7a4cefd0e8d676aedec7a65df8ff3c884d896d316a724f6ea6624ba86d1001162aa136dd62b420b59ce5e6a9e589d54262bf403af823249ea
-
C:\Users\Admin\AppData\Local\Temp\WebInstaller_649D572D268044F6B2F240F5DDF21E67\WebInstaller_2676.log
Filesize6KB
MD53b549b3a6cf3952eb69844701f6414c8
SHA141ee01699749663b82d47c83b81230b2e6754e55
SHA256658d7496e804256660ad227b3fcdd1f6b159498b84aad1ff36661066c99253bd
SHA5122bb6edf6c3b6ec69d6c55ee5c3b19c35709a6a6a34967202ba33e2e3b2adc5addae225ff0474ec3b5eae77fca9a5e7502a47aa8c5eda35ea7f6183484ee127ac