Analysis

  • max time kernel
    15s
  • max time network
    7s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 16:18

General

  • Target

    sublime_text_build_4169_x64_setup.exe

  • Size

    15.7MB

  • MD5

    591561a993ef58f8c547f1542c1ed2d8

  • SHA1

    1177c6451fdaa841f7a8cb0feed53b6621e3356d

  • SHA256

    7f8a7557d92ed985e26d9f0bfefa7d2dec72ee38e28579aca86fcb1114e4c267

  • SHA512

    4902149980eebfdd8720600002d181816d8b36292fd8b5af5a023928738aa30789b3ee3c1075f304b55f4809b2df5dc63fa453e8747672064475e07478829089

  • SSDEEP

    393216:fXI2GZeymKWixJkWwmP7o/OVHLBL5Y7rFQD0t1/26tTK:f4NoymKPQOVHLBLG9+wN1t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\is-6LEQR.tmp\sublime_text_build_4169_x64_setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6LEQR.tmp\sublime_text_build_4169_x64_setup.tmp" /SL5="$4021C,16071622,121344,C:\Users\Admin\AppData\Local\Temp\sublime_text_build_4169_x64_setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:836

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-6LEQR.tmp\sublime_text_build_4169_x64_setup.tmp
    Filesize

    1.1MB

    MD5

    8f7da348d1de78061ff3923fc50a24d5

    SHA1

    117257f0ad968f65c3a51010ffce82fae9411fb0

    SHA256

    5f417318ca2e2b98b9b781106fd9fbb64e959685ca697e017c4365c449baa7ce

    SHA512

    52552bced567566ffe4210cb6ddd27a1f7482559c7574bde0607ce22ae9980b57794cb3d0c4cee63768f69cc9b16336c2540141ff99e57e9c5c33cfc21ff602c

  • memory/836-6-0x0000000000400000-0x000000000052D000-memory.dmp
    Filesize

    1.2MB

  • memory/836-32-0x0000000000400000-0x000000000052D000-memory.dmp
    Filesize

    1.2MB

  • memory/836-175-0x0000000000400000-0x000000000052D000-memory.dmp
    Filesize

    1.2MB

  • memory/2960-0-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2960-2-0x0000000000401000-0x0000000000412000-memory.dmp
    Filesize

    68KB

  • memory/2960-31-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2960-176-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB