Analysis
-
max time kernel
27s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240508-en
General
-
Target
setup.exe
-
Size
1.6MB
-
MD5
f5ab8982b731672950aa6ed2a729bcc0
-
SHA1
70f6a918c6dfbb9ae2b17c54266a6a3823ed92bf
-
SHA256
ca1112dd9429ddc74739928b688751fc28af4f368d18ebec8952858f4fa4377c
-
SHA512
e7943889c63bc5ab6eff6b6fc0ae409057ceb1897fc15e66da32cc54262d07cd11f95231e9d9a8ba29cecfb244f966b1693eb45bfb5d718de19bf48a15b8f1e4
-
SSDEEP
24576:bxGx3HTnsmCxZglmdy1YO9BFjpJwU3KvnkW9aNS/XlaRrSne6SieClSGJgu:UR/CTumdy1x1pu9a2XeDYSxu
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3060 setup.tmp 2888 unins000.exe 2724 _iu14D2N.tmp -
Loads dropped DLL 9 IoCs
pid Process 2896 setup.exe 3060 setup.tmp 3060 setup.tmp 3060 setup.tmp 3060 setup.tmp 3060 setup.tmp 2888 unins000.exe 2724 _iu14D2N.tmp 2724 _iu14D2N.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.dat setup.tmp File created C:\Program Files (x86)\Need for Speed Most Wanted 2012\is-RVQM9.tmp setup.tmp File opened for modification C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.dat _iu14D2N.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 setup.tmp 3060 setup.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3060 setup.tmp 2724 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 2896 wrote to memory of 3060 2896 setup.exe 28 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 3060 wrote to memory of 2888 3060 setup.tmp 29 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30 PID 2888 wrote to memory of 2724 2888 unins000.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\is-RTQH1.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-RTQH1.tmp\setup.tmp" /SL5="$3012E,1013670,238592,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.exe"C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files (x86)\Need for Speed Most Wanted 2012\unins000.exe" /FIRSTPHASEWND=$301E8 /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e8055439f2452961e418843f98ffbe1c
SHA19f6242d6fd97dd0f86ff5e5c6389aaeab30dc196
SHA2563bee9574f8f6dce9ae499374763af3aec2018ba1ac251fe68dfe16742fecce57
SHA512e21a165c45e63b87c32fab974262268d8f3d6bf803c19efb87d041580657cc8f0b77d01ce5b79c1c1dd89fbec568acfb793a41a02eee284042fb955b23bbdf34
-
Filesize
1.3MB
MD58b57bc03f77ef92739cb2ad69f5ac6e3
SHA1931dfb6ff9e94bbad2b3602145503c3b4c9e3b6a
SHA256decac3efbe156cfa4e444c5ab633bbe2fb7af26cde65010ad93e367c740a5731
SHA512d80aae6fd1e2527ce04f2f57bef304157af1afb85b6174ca859333b60f66da2801139c763bff39765993a5e53b3d38e1d9606579ed0ff22d680089fd49136c00
-
Filesize
1.2MB
MD55ec23bf3d9330c95170222e5773050dc
SHA19619d7fcf5e16ce717b7e3b112e37f7f067acfd5
SHA2564a404c6b81dfc861a67e061057468ec61f71b0a2026ce8a34040d7fb51a03358
SHA512171fc9b55dee9a22b1df46631b7e5fb611a56b8dc30a9ef6791df25a6d4698df6f1d00e45fb4b8c76f18ef58001374f96e5322565f2c5ec7064dd5d01412eebb
-
Filesize
453KB
MD534b88e02562a274b786f3e2a2caa4697
SHA18e9b2217a223cb197537bf0d4e288f9152a2609d
SHA256367e83cd3122c3ea8518bf080ae161d350a63a3eda13ab901997aa72b6217ac8
SHA5122bdc4c145ee94224a9750fb81b1f7b3a968d525b3e8dad06ad9fbed2bfd4aab54425a0326a3a3e221863dd767a38898027b7912543bd178ef028995bae24deaa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3