Analysis
-
max time kernel
441s -
max time network
444s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/06/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
HxDSetup.exe
Resource
win11-20240508-en
General
-
Target
HxDSetup.exe
-
Size
3.3MB
-
MD5
4f9e75a41d02666cd5cc86bd33a578fe
-
SHA1
ac08b28e953d7d200bbb3c2e644890a689d0d8b1
-
SHA256
dccfa4b16aa79e273cc7ffc35493c495a7fd09f92a4b790f2dc41c65f64d5378
-
SHA512
0848bfd0494604e4b9173211cfdd27234e15d3728377a237472f404bced36535d486f824428f19c8a8fa35becadff604e5291352b80c9e06d357667b473381ca
-
SSDEEP
98304:oYgmygQ4mUSSlmD5u6hY1T/zgzeJ0pV9u1O:Bgmw4iS+r20u0pVMo
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3376 HxDSetup.tmp 2156 HxD.exe 3028 HxD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\HxD\is-GP6PH.tmp HxDSetup.tmp File created C:\Program Files\HxD\is-TE2JQ.tmp HxDSetup.tmp File created C:\Program Files\HxD\is-SISGI.tmp HxDSetup.tmp File opened for modification C:\Program Files\HxD\unins000.dat HxDSetup.tmp File opened for modification C:\Program Files\HxD\HxD.exe HxDSetup.tmp File created C:\Program Files\HxD\unins000.dat HxDSetup.tmp File created C:\Program Files\HxD\is-UUNNE.tmp HxDSetup.tmp File created C:\Program Files\HxD\is-3R95T.tmp HxDSetup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings HxDSetup.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3376 HxDSetup.tmp 3376 HxDSetup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3376 HxDSetup.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 HxD.exe 2156 HxD.exe 2156 HxD.exe 2156 HxD.exe 2156 HxD.exe 2156 HxD.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 456 wrote to memory of 3376 456 HxDSetup.exe 77 PID 456 wrote to memory of 3376 456 HxDSetup.exe 77 PID 456 wrote to memory of 3376 456 HxDSetup.exe 77 PID 3376 wrote to memory of 3676 3376 HxDSetup.tmp 79 PID 3376 wrote to memory of 3676 3376 HxDSetup.tmp 79 PID 3376 wrote to memory of 3676 3376 HxDSetup.tmp 79 PID 3376 wrote to memory of 2156 3376 HxDSetup.tmp 80 PID 3376 wrote to memory of 2156 3376 HxDSetup.tmp 80 PID 2156 wrote to memory of 3028 2156 HxD.exe 81 PID 2156 wrote to memory of 3028 2156 HxD.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\HxDSetup.exe"C:\Users\Admin\AppData\Local\Temp\HxDSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\is-B1HBA.tmp\HxDSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-B1HBA.tmp\HxDSetup.tmp" /SL5="$60216,2973524,121344,C:\Users\Admin\AppData\Local\Temp\HxDSetup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\HxD\readme.txt3⤵PID:3676
-
-
C:\Program Files\HxD\HxD.exe"C:\Program Files\HxD\HxD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\HxD\HxD.exe"C:\Program Files\HxD\HxD.exe" /chooselang4⤵
- Executes dropped EXE
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD514fca45f383b3de689d38f45c283f71f
SHA15cb16e51c3bb3c63613ffd6d77505db7c5aa4ed6
SHA2569d460040a454deeb3fe69300fe6b9017350e1efcb1f52f7f14a4702d96cb45ca
SHA5120014192bd5f0eb8b2cd80042937ccc0228ff19123b10ee938e3b72a080e3f8d3d215f62b68810d4e06b5fad8322d0327dcd17d0a29fd0db570c0cd7da825634c
-
Filesize
4KB
MD50755d4e1fdf379c36369e96f6f6d8fa8
SHA1f0d81e81e06fb10d2844acdad3a89e32ac624ec2
SHA256ca4f74de91db68db75a685640957140c42d8d01659c20cf72eb771a0f7bcba2d
SHA51256982440f67d2a04418e885cccdb9c1916a69ca58564d660fef8a8d88ed74c949b99ddff4da1bf6f654e6f3003488a5e2d3426cf64b055bdd51a423648334e3f
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb
-
Filesize
3B
MD5392b810f865591aa5ec210e849ae769f
SHA1f3fd0c8f2a347e168ef392e38c52f4134987a3a6
SHA25678b33626b46709ebe04edd99ea813ed291183bebb025ea5e4783ca2260811943
SHA5125d650d9045243ce2495a845683b3252419bc283fe9ecec85b56de0a179a5df77d8ddf8ccb41ff555043bf1e9a3c9a0a3e1efec17cc2d291b5236589a80df0f04