Analysis
-
max time kernel
540s -
max time network
553s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
file.rar
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
amdhip64.dll
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
concrt140.dll
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
msvcp140.dll
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win11-20240419-en
Behavioral task
behavioral6
Sample
setup.exe
Resource
win11-20240419-en
General
-
Target
setup.exe
-
Size
785.0MB
-
MD5
640e910d06ebab4b066a696ba0e78b55
-
SHA1
534e97d66e68eab6fa916fabe05beaef822b56e8
-
SHA256
9b5e9a1b37be8612f14d52bd6a1bfbb850a05164d677738bcf6ea41c1a1c97a6
-
SHA512
9dd5f8b06e675912e53833e4cc7a77ab06a3e25d7e23c907f351e715011c1096baaed0e8a1dd5ec56d69124988fb1bce082ee3cda3b5b70ee301fedb56b01177
-
SSDEEP
98304:rO0hNxrp27xGHwGZpRiE5ygmAfrjQxuN7:rOUnQAHwipRtw1ol
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 setup.exe 3932 setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2788