Resubmissions

09-05-2024 14:33

240509-rxayrsee7v 8

09-05-2024 13:32

240509-qs211sca4z 8

09-05-2024 13:30

240509-qr7j4sbh9s 7

09-05-2024 13:07

240509-qc3bvaba7v 8

Analysis

  • max time kernel
    52s
  • max time network
    45s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 14:33

General

  • Target

    innosetup-6.2.2 (1).exe

  • Size

    4.5MB

  • MD5

    2893b10c36fddb20a38e9b8b9a44d647

  • SHA1

    9ab6a2f797d5efc3c5c3985d48fc63c6a111f643

  • SHA256

    8117d10d00a2ad33a1390978ea3872861c330e087914410a6377b22c4c5b8563

  • SHA512

    496375b1ce9c0d2f8eb3930ebd8366f5c4c938bc1eda47aed415e3f02bd8651a84a770a15f2825bf3c8ed9dbefa355b9eb805dd76bc782f6d8c8096d80443099

  • SSDEEP

    98304:6kLsYMYXKk7jmHED1W+Q6zBcLOYCwOo5mympFVWkj6Z:VsoJ7SHElRcLFEo5yhWkj6Z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\innosetup-6.2.2 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\innosetup-6.2.2 (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\is-4P9AN.tmp\innosetup-6.2.2 (1).tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4P9AN.tmp\innosetup-6.2.2 (1).tmp" /SL5="$8020C,3752627,832512,C:\Users\Admin\AppData\Local\Temp\innosetup-6.2.2 (1).exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Program Files (x86)\Inno Setup 6\Compil32.exe
        "C:\Program Files (x86)\Inno Setup 6\Compil32.exe" /ASSOC
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        PID:4968
      • C:\Program Files (x86)\Inno Setup 6\Compil32.exe
        "C:\Program Files (x86)\Inno Setup 6\Compil32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Inno Setup 6\Compil32.exe

    Filesize

    2.7MB

    MD5

    9883f2b76a55bba9ad696669845b7aec

    SHA1

    6778e521b30cd2652d3e4d0a2cedfa3169782523

    SHA256

    f33e603734fded7452d016e96097dbe144a7294fea2a504c44693ff06ac8f014

    SHA512

    1b06a8586dc4addece0adb7950825ff12eff25184761b0185cb72ce771af2d154f9b8ba619dd035402e186a389cc8867142361307e4960144fe7ec493bfe2a65

  • C:\Program Files (x86)\Inno Setup 6\ISCmplr.dll

    Filesize

    1.6MB

    MD5

    b2798de167b7ae95b44be03ec3a56eab

    SHA1

    37f830e5d88a509d25983ddfc50d6ebd7982d7da

    SHA256

    1a8a9332d55229b71749c7b01b8e4c1e34ae958be9d35f6dac76e233cdcf2deb

    SHA512

    1c02d80ff9b10c1162a10e23896b40053ddfdc578a2a8b408f79098514d922bd0181154428462f43f0a41d89d90dbc65acc7a623f2f686ef197b027b715231e5

  • C:\Program Files (x86)\Inno Setup 6\isscint.dll

    Filesize

    283KB

    MD5

    8ed7503a4a911a37b3719050962bcd93

    SHA1

    1c8b8d2a8f90c98f2567287197d6a05a0231321d

    SHA256

    7d1c2cc3f4b6a1eee8eadffc7991df534566dfd5e0dad6e44f2409ff47030a95

    SHA512

    70d8aa132ab20012ee44c5e211bf3b8bb687c97589cebd3302232395733ff878543877ee1255fa937eb1c7511c54019846ae07921e81b613f12284473e97acd8

  • C:\Users\Admin\AppData\Local\Temp\is-4P9AN.tmp\innosetup-6.2.2 (1).tmp

    Filesize

    3.1MB

    MD5

    1a860ade3cf55b75dca48e96e5a7fb65

    SHA1

    595e3d6255f52792c62e7e3c6e1c17039da1b813

    SHA256

    7d1aa4fa34882122afe88fab6b14b97ef75f26e41dcfefd606f17444016b46aa

    SHA512

    ec7a49e257863b3dee39c1352b8fd65d3e4a6e4941f74a2082d92b41971d3f73d1ecc44d9ea64c7ce715117e1a1e4316b3631290425a967b4e3678d1cbd5b409

  • C:\Users\Admin\AppData\Local\Temp\is-JEQFA.tmp\ISCrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • memory/1820-15-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1820-233-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1820-246-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1820-17-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1820-6-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/3296-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/3296-14-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3296-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3296-247-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4956-239-0x0000000000B90000-0x0000000000D36000-memory.dmp

    Filesize

    1.6MB

  • memory/4956-249-0x0000000000B90000-0x0000000000D36000-memory.dmp

    Filesize

    1.6MB

  • memory/4956-248-0x0000000000400000-0x00000000006C7000-memory.dmp

    Filesize

    2.8MB

  • memory/4968-227-0x0000000000CB0000-0x0000000000E56000-memory.dmp

    Filesize

    1.6MB

  • memory/4968-228-0x0000000000400000-0x00000000006C7000-memory.dmp

    Filesize

    2.8MB

  • memory/4968-231-0x0000000000400000-0x00000000006C7000-memory.dmp

    Filesize

    2.8MB

  • memory/4968-230-0x0000000000CB0000-0x0000000000E56000-memory.dmp

    Filesize

    1.6MB