Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
EVDsetup/#XIAOYI.VC.url
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
EVDsetup/#XIAOYI.VC.url
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
EVDsetup/#ע.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
EVDsetup/#ע.url
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
EVDsetup/EVDsetup.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
EVDsetup/EVDsetup.exe
Resource
win10v2004-20240419-en
General
-
Target
EVDsetup/EVDsetup.exe
-
Size
1.7MB
-
MD5
07b414c2329beb9bf041342e3ed7235f
-
SHA1
82af12c5963cb7f30fac0cdd6719578ed8fb715b
-
SHA256
4073e1d8d1951e4e10554cabbc5e01e60f3d6f843fe7ceb382bad18927efe521
-
SHA512
10079a875f8820da8857a14af67dacee99f5597e4df2aa36766111cc24f64e627d134869745deb553920ea1bb096829755db1bfb1cb809fe78a1daa75faf56fc
-
SSDEEP
24576:L7FUDowAyrTVE3U5FCaJRtkL44IHt9ZXu+ZIJo8x8hkiHNckvwyhaumwE7tUv:LBuZrEUJJR+aHfZaD4oybgx6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 EVDsetup.tmp -
Loads dropped DLL 1 IoCs
pid Process 1256 EVDsetup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1968 EVDsetup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28 PID 1256 wrote to memory of 1968 1256 EVDsetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\EVDsetup\EVDsetup.exe"C:\Users\Admin\AppData\Local\Temp\EVDsetup\EVDsetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\is-B4AIL.tmp\EVDsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-B4AIL.tmp\EVDsetup.tmp" /SL5="$5014E,973396,818176,C:\Users\Admin\AppData\Local\Temp\EVDsetup\EVDsetup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51fa430ad935819abb704d85ebf051c9f
SHA1cc391b40147ebda2120c59c94bf31e54e6472755
SHA25624d9767b7f11ceb3cab54bbbee6eed2b5e8a55072dd0b96888d86f367c74ba51
SHA5125c7fc992459cc6a2db3e8943c745cc01e14571097fcea0303b5eeab5c40df4b03ed5771a3e7ae6b911b47705fcac31034379a5810087c8e86fbbf9bf0f6ef94d