Analysis
-
max time kernel
16s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 18:28
Behavioral task
behavioral1
Sample
MBSetup.exe
Resource
win7-20240611-en
windows7-x64
5 signatures
300 seconds
Behavioral task
behavioral2
Sample
MBSetup.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
6 signatures
300 seconds
General
-
Target
MBSetup.exe
-
Size
274.9MB
-
MD5
d5f4c48776e0325441cf4dc2cc1438b0
-
SHA1
54189331a894343cc84e9fd38263bfe97c1f587c
-
SHA256
a1abc09b00b453c349c4009f1fae1a37146b33a173fa140c7dab184afb373562
-
SHA512
25975f2bf83e2bc42c1ef180e0790306a0771eabf4ff228dc82d5cf3a95100b469545bbba3b9724edb329829699e4551478d88fd4f464be59392a363a3e38d63
-
SSDEEP
6291456:/XMhC20JUpYBpL27XqVaUNPhXmN20JUpYBO13JDH0nlBh9J/uOl/ez:/UC26UOLopUNPhY26UOY1ZQh9Jz+
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\mbamtestfile.dat MBSetup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 MBSetup.exe 2644 MBSetup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 MBSetup.exe