Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
run.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
run.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20240611-en
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
d6f06bd55e0b3df26ffef8202ac50fcb
-
SHA1
c4aec4d3c6cb9bf1fbe8b390bd67d7de6d4d3d77
-
SHA256
a4f90001d9d1edba609b4e827f908672700f632cd5a8805eff48e4f68b2d6893
-
SHA512
dca4313afe04ac238ad34aac35b27bea0c9e577834395c9f37c720efc83fc9ad4d4bb33b8e57838ae869041219fe8fd8e17e432a0c84e56acdc9893086d0d749
-
SSDEEP
49152:ku8PfVQOg+l5pJXlst4igqSJYpSr80BEt2Ssc:J8Pfbg+l5/eZS3r3c
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4148 netsh.exe 3800 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4244 halres.exe 1244 halres.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies halres.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 halres.exe File created C:\Windows\SysWOW64\09B226B6055E526E99795DBEBEF394F4\conf\.time halres.exe File created C:\Windows\SysWOW64\halres.exe Setup.exe File opened for modification C:\Windows\SysWOW64\halres.exe Setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 halres.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE halres.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ halres.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" halres.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" halres.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" halres.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" halres.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix halres.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" halres.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" halres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 halres.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 304 wrote to memory of 4244 304 Setup.exe 84 PID 304 wrote to memory of 4244 304 Setup.exe 84 PID 304 wrote to memory of 4244 304 Setup.exe 84 PID 1244 wrote to memory of 4148 1244 halres.exe 89 PID 1244 wrote to memory of 4148 1244 halres.exe 89 PID 1244 wrote to memory of 4148 1244 halres.exe 89 PID 1244 wrote to memory of 3800 1244 halres.exe 91 PID 1244 wrote to memory of 3800 1244 halres.exe 91 PID 1244 wrote to memory of 3800 1244 halres.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\halres.exe"C:\Windows\system32\halres.exe" /i2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\SysWOW64\halres.exe"C:\Windows\SysWOW64\halres.exe" /s /p 270161⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall firewall delete rule name="halres.exe"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4148
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall firewall add rule name="halres.exe" dir=in action=allow program="C:\Windows\SysWOW64\halres.exe" enable=yes profile=any2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5d6f06bd55e0b3df26ffef8202ac50fcb
SHA1c4aec4d3c6cb9bf1fbe8b390bd67d7de6d4d3d77
SHA256a4f90001d9d1edba609b4e827f908672700f632cd5a8805eff48e4f68b2d6893
SHA512dca4313afe04ac238ad34aac35b27bea0c9e577834395c9f37c720efc83fc9ad4d4bb33b8e57838ae869041219fe8fd8e17e432a0c84e56acdc9893086d0d749