Analysis
-
max time kernel
1790s -
max time network
1510s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/05/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win11-20240426-en
General
-
Target
Setup.exe
-
Size
5.0MB
-
MD5
caac5a53470b5954a50128e9435ef196
-
SHA1
b1b44b0503e10928ae6ce640bd16103f877eab50
-
SHA256
ec175ebd158f304483c4b83baeae9087de2441dcacf034e4651ff6f91908c671
-
SHA512
0eba886c8a77f983b554e9a8c162af80195b6fcfe8ef4af9c9437d4a31b4ca4c59ce451a9bfe86033b60c297f68652d4b8cc86788794b9eb515f417ab55bda9c
-
SSDEEP
98304:7kL3mhPAI7wCOscLj29ywLe3CV1OorsfKXUlYhvFGAJsAQa+:wW8CcPDwLQCVNrsf6qk7JpQf
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000100000002a9c7-148.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 5072 Setup.tmp -
Loads dropped DLL 7 IoCs
pid Process 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp -
resource yara_rule behavioral1/files/0x000100000002a9c7-148.dat upx behavioral1/memory/5072-152-0x0000000000940000-0x00000000009AF000-memory.dmp upx behavioral1/memory/5072-156-0x0000000000940000-0x00000000009AF000-memory.dmp upx behavioral1/memory/5072-220-0x0000000000940000-0x00000000009AF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 32 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Setup.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Setup.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Setup.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Setup.tmp Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Setup.tmp -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 5072 Setup.tmp -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5072 Setup.tmp 5072 Setup.tmp 5072 Setup.tmp 3000 MiniSearchHost.exe 5072 Setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 5072 988 Setup.exe 78 PID 988 wrote to memory of 5072 988 Setup.exe 78 PID 988 wrote to memory of 5072 988 Setup.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\is-SOCCC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SOCCC.tmp\Setup.tmp" /SL5="$40214,3940425,902656,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD52f23663111658be2ba0b273463ff5e60
SHA1c2af77369b83a0177bfdb90c11fad4c5f897a983
SHA256eab4709a1ad32b0b87a53d307893899eb3ee26c6a59a1b34fe83062c79817513
SHA512e0fdfe555a47709cbf14c4c22498c89c3e8fd61c5b40806b9dd06aee20fbdcd3d9c4f7861d1183df15e9c64ed25828f97c8292bc6b4a700d3d4586433bf45bd8
-
Filesize
10KB
MD5ec40d4afe76e343f6699f43c39dd7de1
SHA10ac4b653f41d86bab65c93e21cd75237d5e535de
SHA256b4bcacce0c757095a5d93c1e7f19ee5e4642fd93b60af2652df3effb63f35ebd
SHA512f21f000cea6545b620ca54a38ff138964110de83ae21cdf26037f8ae432b5b19dc9f8bb7fb8d1c76cde0817700526fba4c5678b80a2110c5c1de9b69fda1c632
-
Filesize
629B
MD52b1d9582b95786dc0c480bdb1bc8d1f1
SHA1bc97abe4b7a28f6f6bf71fb35cb0741d7bdce674
SHA2560b41a8e1110d397983ad35b1b0f6c34a05d9a4f43cdd698a0928718516d8987a
SHA51232beb60944acea28d792b56df26f688a127c89db3591cd3ff360bce8dbcd8e4f386cac5fc976dac4e4a289969a3e344cf0ca5df5938803eb08b8da7073ed35db
-
Filesize
452KB
MD54feafa8b5e8cdb349125c8af0ac43974
SHA17f17e5e1b088fc73690888b215962fbcd395c9bd
SHA256bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71
SHA512d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc
-
Filesize
163B
MD5d7eb454ff458f367271d285b33ad68da
SHA1f24d71fb4a4c6ed24dade9337ecc46925ea4592a
SHA256216d6c99f4858c55260e532ef1bd8c6cc9051322c68c5872a6208a1f652b3bdc
SHA5128496c22a2420acb365a24d90123702944a8ebc69b288f6dae96753da2a695b84b88b6084eb81e9596f815eb7c4c31d28f0e68c487f6eb71b52f33be704f33ddb
-
Filesize
14KB
MD58854b82d0bf7c385d3b3c77af6a18a46
SHA1ffc031bf912e591bc4dcb901847c9cb5ea77e108
SHA256cdff966659bfdc51e28b55fc13410fcc9bcc11b6ba4573e612b3d6dc4e372512
SHA5123e1905889f2aed208f28b0a56c22bd2b6018e635a5c3d8840819f61d82167206ace56c301a6bfc85901cad8fd9f59828921e48f9de4fc5a95127a7bdd430511e
-
Filesize
131KB
MD5f88a327b7750da6f26231a1469d39f8b
SHA110ce445cabe9f58ec3ec1c8710ec0e7dd3e12f35
SHA256f616d3c1663a5114e3c05f4427e16ebaae6ac7cd4a333a7c8c4dafcab5de1ea9
SHA51258677241f57f18409ff5327b847a4124399fc4adfd991f71aeba9b0beea7dc8fb4924e85487627f660f23ef2fc2aa2affc69963b47548f9e69b88401690177a6
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
3.1MB
MD539338b58cb777ed571a7ee2b4acae4e2
SHA185b059ea3ed9d86946f806fb256437697e9f4889
SHA256fe2cfd99de1affbb1e18339f0eea055d925781cfa4c94507e802110f52e22f7d
SHA512b3802d39877595f24a6907765655a5cc197c9de1e922e1ef7f006de83749ac242e7ffd6c27ab26a6e2e8efb3d49192dc3cf409d33d668f75c5b35f6d73941023