Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 14:41

General

  • Target

    safe-archive/setup.exe

  • Size

    736.0MB

  • MD5

    2807c018ea2b8da2e2324da6d4181711

  • SHA1

    0fbb3e33a2780932dec7ce4e45995fcbd1d4c4b9

  • SHA256

    889d47ce91b7af3bcdbda903e7fa2533e45d77e4ff09b75885a572b5204bba54

  • SHA512

    e050b85fddb43214bd327e3646e0ba9b9e985a70fa207d22670871a7ca68349213b05a615721aaa84a6a2211a32599586ae7548160e9da4e2941778d249309af

  • SSDEEP

    98304:tw5NofUrgQZP/tn7/ejXG3qSi3V635t5pTHF:25NofUrrJ1nsSi3V635HFF

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\safe-archive\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\safe-archive\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab21F4.tmp

    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • memory/2116-18-0x0000000077020000-0x0000000077022000-memory.dmp

    Filesize

    8KB

  • memory/2116-10-0x0000000077000000-0x0000000077002000-memory.dmp

    Filesize

    8KB

  • memory/2116-20-0x0000000077020000-0x0000000077022000-memory.dmp

    Filesize

    8KB

  • memory/2116-23-0x000007FEFCE80000-0x000007FEFCE82000-memory.dmp

    Filesize

    8KB

  • memory/2116-16-0x0000000077020000-0x0000000077022000-memory.dmp

    Filesize

    8KB

  • memory/2116-6-0x0000000077000000-0x0000000077002000-memory.dmp

    Filesize

    8KB

  • memory/2116-13-0x0000000077010000-0x0000000077012000-memory.dmp

    Filesize

    8KB

  • memory/2116-11-0x0000000077010000-0x0000000077012000-memory.dmp

    Filesize

    8KB

  • memory/2116-15-0x0000000077010000-0x0000000077012000-memory.dmp

    Filesize

    8KB

  • memory/2116-5-0x0000000076FF0000-0x0000000076FF2000-memory.dmp

    Filesize

    8KB

  • memory/2116-0-0x000000013FF85000-0x000000014013B000-memory.dmp

    Filesize

    1.7MB

  • memory/2116-1-0x0000000076FF0000-0x0000000076FF2000-memory.dmp

    Filesize

    8KB

  • memory/2116-8-0x0000000077000000-0x0000000077002000-memory.dmp

    Filesize

    8KB

  • memory/2116-25-0x000007FEFCE80000-0x000007FEFCE82000-memory.dmp

    Filesize

    8KB

  • memory/2116-28-0x000007FEFCE90000-0x000007FEFCE92000-memory.dmp

    Filesize

    8KB

  • memory/2116-30-0x000007FEFCE90000-0x000007FEFCE92000-memory.dmp

    Filesize

    8KB

  • memory/2116-31-0x000000013FE20000-0x000000014042B000-memory.dmp

    Filesize

    6.0MB

  • memory/2116-45-0x0000000000150000-0x000000000016A000-memory.dmp

    Filesize

    104KB

  • memory/2116-54-0x0000000000170000-0x000000000018A000-memory.dmp

    Filesize

    104KB

  • memory/2116-3-0x0000000076FF0000-0x0000000076FF2000-memory.dmp

    Filesize

    8KB

  • memory/2116-78-0x000000013FF85000-0x000000014013B000-memory.dmp

    Filesize

    1.7MB