Analysis

  • max time kernel
    133s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 23:45

General

  • Target

    Setup.exe

  • Size

    941KB

  • MD5

    0e6a6b22e10a5e7ec041b27dfb028b21

  • SHA1

    29df4fcc3392e0283ec0a117ae62d5cfc69034ed

  • SHA256

    6ef5d2c1b0483e36a7d5bc8413189cb02303c111dbb9f74a8b78c50d0f25f7b9

  • SHA512

    f01f1d5489bfbefd742f8fa1da6fa6caa4e194c748871ecef3874401484647ac5d4d9467a5d74b8d2c0e88ed3a1cfcbde63cb09da43ea0bc4735f1ffd2f87920

  • SSDEEP

    12288:NditaBc8+n8KUbj3E/jsJoD4wT/VkPmyCPsjcVH/cONWNNNlqPK4gF2MpgXD4UQK:NdY7n8Kf/jsJonPK4g8JXD4UUy

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\SysWOW64\Msiexec.exe
      Msiexec /I "" REBOOT=ReallySuppress /qb
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3648
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads