Analysis

  • max time kernel
    58s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 16:18

General

  • Target

    sublime_text_build_4169_x64_setup.exe

  • Size

    15.7MB

  • MD5

    591561a993ef58f8c547f1542c1ed2d8

  • SHA1

    1177c6451fdaa841f7a8cb0feed53b6621e3356d

  • SHA256

    7f8a7557d92ed985e26d9f0bfefa7d2dec72ee38e28579aca86fcb1114e4c267

  • SHA512

    4902149980eebfdd8720600002d181816d8b36292fd8b5af5a023928738aa30789b3ee3c1075f304b55f4809b2df5dc63fa453e8747672064475e07478829089

  • SSDEEP

    393216:fXI2GZeymKWixJkWwmP7o/OVHLBL5Y7rFQD0t1/26tTK:f4NoymKPQOVHLBLG9+wN1t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\is-B0C4D.tmp\sublime_text_build_4169_x64_setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-B0C4D.tmp\sublime_text_build_4169_x64_setup.tmp" /SL5="$4010A,16071622,121344,C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Sublime Text\sublime_text.exe

    Filesize

    9.4MB

    MD5

    5b3c8cea0fca4323f0e8a994209042a8

    SHA1

    fa75cbd9a41c18f4ea90aa713ec9f8c230d3fbc5

    SHA256

    3bdd447101d108dec57da58b8b043019fa422081017a153d49e2a2f2e89d043d

    SHA512

    ccd3cc6d5771114bc3860c2aecd5e304eb091ae941b97baf5635d2dc30fbea89d69e48b4ccde19bde45429b3133758c824eefc6ff27e7260b6146f9002e2f31e

  • \Users\Admin\AppData\Local\Temp\is-B0C4D.tmp\sublime_text_build_4169_x64_setup.tmp

    Filesize

    1.1MB

    MD5

    8f7da348d1de78061ff3923fc50a24d5

    SHA1

    117257f0ad968f65c3a51010ffce82fae9411fb0

    SHA256

    5f417318ca2e2b98b9b781106fd9fbb64e959685ca697e017c4365c449baa7ce

    SHA512

    52552bced567566ffe4210cb6ddd27a1f7482559c7574bde0607ce22ae9980b57794cb3d0c4cee63768f69cc9b16336c2540141ff99e57e9c5c33cfc21ff602c

  • memory/1320-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1320-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/1320-10-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1320-187-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3020-8-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/3020-11-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/3020-186-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB