Analysis
-
max time kernel
1791s -
max time network
1589s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26-05-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10-20240404-en
General
-
Target
Setup.exe
-
Size
5.0MB
-
MD5
caac5a53470b5954a50128e9435ef196
-
SHA1
b1b44b0503e10928ae6ce640bd16103f877eab50
-
SHA256
ec175ebd158f304483c4b83baeae9087de2441dcacf034e4651ff6f91908c671
-
SHA512
0eba886c8a77f983b554e9a8c162af80195b6fcfe8ef4af9c9437d4a31b4ca4c59ce451a9bfe86033b60c297f68652d4b8cc86788794b9eb515f417ab55bda9c
-
SSDEEP
98304:7kL3mhPAI7wCOscLj29ywLe3CV1OorsfKXUlYhvFGAJsAQa+:wW8CcPDwLQCVNrsf6qk7JpQf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4872 Setup.tmp -
Loads dropped DLL 2 IoCs
pid Process 4872 Setup.tmp 4872 Setup.tmp -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4872 Setup.tmp 4872 Setup.tmp 4872 Setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4872 2368 Setup.exe 73 PID 2368 wrote to memory of 4872 2368 Setup.exe 73 PID 2368 wrote to memory of 4872 2368 Setup.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\is-2E7RS.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-2E7RS.tmp\Setup.tmp" /SL5="$1201F4,3940425,902656,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD539338b58cb777ed571a7ee2b4acae4e2
SHA185b059ea3ed9d86946f806fb256437697e9f4889
SHA256fe2cfd99de1affbb1e18339f0eea055d925781cfa4c94507e802110f52e22f7d
SHA512b3802d39877595f24a6907765655a5cc197c9de1e922e1ef7f006de83749ac242e7ffd6c27ab26a6e2e8efb3d49192dc3cf409d33d668f75c5b35f6d73941023
-
Filesize
14KB
MD58854b82d0bf7c385d3b3c77af6a18a46
SHA1ffc031bf912e591bc4dcb901847c9cb5ea77e108
SHA256cdff966659bfdc51e28b55fc13410fcc9bcc11b6ba4573e612b3d6dc4e372512
SHA5123e1905889f2aed208f28b0a56c22bd2b6018e635a5c3d8840819f61d82167206ace56c301a6bfc85901cad8fd9f59828921e48f9de4fc5a95127a7bdd430511e
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2