Analysis
-
max time kernel
93s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 21:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240221-en
windows7-x64
0 signatures
300 seconds
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
windows10-1703-x64
2 signatures
300 seconds
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
300 seconds
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11-20240508-en
windows11-21h2-x64
2 signatures
300 seconds
General
-
Target
Setup.exe
-
Size
42.9MB
-
MD5
c419c8a5c46aa90a4c825e0d92f3ce64
-
SHA1
873f3b0ca75cb36a6696b08030bc3ea6fcbddb58
-
SHA256
e0416ecc1fdcec19689cbc21492e6cb8f5802da7466611f578e5bce0710c064a
-
SHA512
3b528b86805716c68c2b0a28e31390052c17c354f6202997f814a8ce93846c349eeabd2846a917e99945ef2f8ed8096d5d3d27adb5f71a0be8eb813f9d32c22b
-
SSDEEP
196608:am3LfYVSsbwLpCKfpTPGZAdpCBEYFK0SGO0gisv:j3EVS4KfpTSAdMBEYU0gNisv
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4608 set thread context of 836 4608 Setup.exe 88 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4608 wrote to memory of 836 4608 Setup.exe 88 PID 4608 wrote to memory of 836 4608 Setup.exe 88 PID 4608 wrote to memory of 836 4608 Setup.exe 88 PID 4608 wrote to memory of 836 4608 Setup.exe 88 PID 4608 wrote to memory of 836 4608 Setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:836
-