Analysis

  • max time kernel
    142s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 17:05

General

  • Target

    Stardock Fences v4.19.0/StardockFences v4.19.0 x64/StardockFences v4.19.0 x64.exe

  • Size

    13.1MB

  • MD5

    1859e9321fe3864a9c618e07f88083d8

  • SHA1

    0d4faad7c2fb84ffde884f02431d6d7ac599e0f6

  • SHA256

    924a04a650561cc238b242c04bb3ce941f444b156617a5d2b6c6022028cf9dd4

  • SHA512

    9bb0a5709454ea2f9d2e3a1ab7a3fde565b40bdebbc5085d624f557eb51615802aa7c4382b8d906767f0f03e1c3c4671b8015cf81faaf293bec40833f970e26c

  • SSDEEP

    393216:TAPSiFj6xF2V8x8BERsRGHD+rFvajKhX9:sPSC6xFuC8ORSGDyL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stardock Fences v4.19.0\StardockFences v4.19.0 x64\StardockFences v4.19.0 x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Stardock Fences v4.19.0\StardockFences v4.19.0 x64\StardockFences v4.19.0 x64.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1948706 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\Stardock Fences v4.19.0\StardockFences v4.19.0 x64\StardockFences v4.19.0 x64.exe" "__IRCT:3" "__IRTSS:0" "__IRSID:S-1-5-21-2539840389-1261165778-1087677076-1000"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" export HKLM\Software\Stardock C:\Users\Admin\AppData\Local\Temp\registry_export.txt /y /reg:32
        3⤵
          PID:3952
        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe
          "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe" C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.tmp
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2632

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\Encoding.lmd

            Filesize

            393KB

            MD5

            6eec47ab86d212fe3ed0f56985c8e817

            SHA1

            06da90bcc06c73ce2c7e112818af65f66fcae6c3

            SHA256

            d0b2fa60e707982899ecd8c4dc462721c82491245b26721a7c0e840c5f557aed

            SHA512

            36d6ef8a3fecb2c423079cadbfcbe2b044095f641c9a6ce0f9d0e96c6400f00a089aa26cc9d361bfdbcfdc3a8487d18d64956b36f39320648d1ddb565221a9cb

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe

            Filesize

            58KB

            MD5

            55bbf335f75f2a2fe0a5daf603964d41

            SHA1

            f1b9686e8a9f10682722fc5e08c02c016b597804

            SHA256

            723adae0e69127a6bfbc65c5ef552a351264205ea5e2bc3b80e505feaa5d0e43

            SHA512

            af49055234cb4a0ddbc68212db094c7a7a1058ccf6a1a5830238fe3ff96fa35390d242322436839d6d7e419bd9e4ad8962e213222470625cffb46423dec44db6

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.tmp

            Filesize

            41B

            MD5

            4c57c124febc2a0121e1a51f5117af90

            SHA1

            e4e9baedd2fa7c22f1c070b06cb99372db933a25

            SHA256

            08b83f55dcb68df067b0d134cb3b568c2f271b143594dab8c199c7af7ca5d215

            SHA512

            4f90d197d8f57971f9ebdad239bf8d24cbe07457d9129560922d50298fc5ec4d9be20fdde3947d1d9d7a1563636163b4728dfc0ab5fa9c3f5a7f06a42eb26369

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\eula.txt

            Filesize

            22KB

            MD5

            1345eca97d4afbfce7519c90b5312ab1

            SHA1

            6bbf9ae942e0e066b9039d8f437ae364a3887b64

            SHA256

            ee0c0b950573ae14eb006168a7c42b1c2bc1edf9223c9acc560db13bc63900e1

            SHA512

            8c48526f2aa7b066dbfa15434fd6c1a555544d100cd30c6ea92021a65f21a2a20ea1c0f5cf1f37b3d1cd564f30c4999ce83d269ab729822904102a27cd40795e

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

            Filesize

            1.3MB

            MD5

            68ac216f38a5f7c823712c216ca4b060

            SHA1

            f6ad96e91103c40eb33fd3f1324d99093e5d014e

            SHA256

            748d48d246526e2a79edcde87255ffa5387e3bcc94f6ca5e59589e07e683cd80

            SHA512

            9b7dce4ed6e2caee1cdb33e490e7062344d95d27ba48e96f66094a3413da27fb32680dd2e9a5b2091489780929c27fe36914210793fbef81dfb5b4fb1a9b469b

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

            Filesize

            326KB

            MD5

            80d93d38badecdd2b134fe4699721223

            SHA1

            e829e58091bae93bc64e0c6f9f0bac999cfda23d

            SHA256

            c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59

            SHA512

            9f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4

          • memory/4436-36-0x0000000006880000-0x0000000006883000-memory.dmp

            Filesize

            12KB

          • memory/4436-35-0x0000000010000000-0x0000000010144000-memory.dmp

            Filesize

            1.3MB

          • memory/4436-14-0x0000000000E40000-0x0000000001228000-memory.dmp

            Filesize

            3.9MB

          • memory/4436-62-0x0000000010000000-0x0000000010144000-memory.dmp

            Filesize

            1.3MB

          • memory/4436-61-0x0000000000E40000-0x0000000001228000-memory.dmp

            Filesize

            3.9MB

          • memory/4436-68-0x0000000000E40000-0x0000000001228000-memory.dmp

            Filesize

            3.9MB

          • memory/4436-69-0x0000000010000000-0x0000000010144000-memory.dmp

            Filesize

            1.3MB

          • memory/4436-70-0x0000000006880000-0x0000000006883000-memory.dmp

            Filesize

            12KB

          • memory/4436-74-0x0000000010000000-0x0000000010144000-memory.dmp

            Filesize

            1.3MB