Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 20:08

General

  • Target

    $TEMP/SU_lk78_setup_lg0597.exe

  • Size

    648KB

  • MD5

    322911f9d1f42fc32fa4f454ce397fc5

  • SHA1

    225c8eea86b79ab46bafc4bc6e77ee835dd05680

  • SHA256

    85c11981201ed48bf93924b0c747bfde0a3a368fdb8cb938a02da667e653a0a7

  • SHA512

    7c52c8384f13d8b273d1358a96469ff0102a11f60cfa8e79f300c380991eeb4a5e5be91eda3cf5f07ab95ad7366f5425469fe863a1b32fe8f3d689e1dad2bfc8

  • SSDEEP

    12288:ulBPW49JlJW2uTkuIdP2mg/L0YTKIK00DYN/w5ib6mjc0Z:uvPWaJvpuTkthyL0YTtdlN/w5iemfZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\SU_lk78_setup_lg0597.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\SU_lk78_setup_lg0597.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\is-955VN.tmp\SU_lk78_setup_lg0597.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-955VN.tmp\SU_lk78_setup_lg0597.tmp" /SL5="$4010A,317431,67072,C:\Users\Admin\AppData\Local\Temp\$TEMP\SU_lk78_setup_lg0597.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-955VN.tmp\SU_lk78_setup_lg0597.tmp
    Filesize

    711KB

    MD5

    d46e2d82589924a5dd132be8b5af79e6

    SHA1

    cfd7c1adaf4653342c27fa536d257fffb6cfa531

    SHA256

    6e35b0aa3c98d70737da7d4bb4ac8e798980c32ec1cd1162684b39b691770235

    SHA512

    944cc9b3b32b12db6564f0588ee3ed4c77110fe1f8bc2018733b34a71a3bc3b6771bfbe7a8805454aeb5e9de1e15941465675fad5517d80f14ad9fa461c67f59

  • \Users\Admin\AppData\Local\Temp\is-DMO0S.tmp\_isetup\_shfoldr.dll
    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1752-2-0x0000000000401000-0x000000000040C000-memory.dmp
    Filesize

    44KB

  • memory/1752-0-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1752-15-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/2464-8-0x0000000000400000-0x00000000004C2000-memory.dmp
    Filesize

    776KB

  • memory/2464-16-0x0000000000400000-0x00000000004C2000-memory.dmp
    Filesize

    776KB