Overview
overview
10Static
static
3Language/c...1].exe
windows7-x64
Language/c...1].exe
windows10-2004-x64
Language/e...eN.dll
windows7-x64
1Language/e...eN.dll
windows10-2004-x64
1Language/e...32.dll
windows7-x64
1Language/e...32.dll
windows10-2004-x64
1Setup.exe
windows7-x64
5Setup.exe
windows10-2004-x64
10barchan.pptx
windows7-x64
1barchan.pptx
windows10-2004-x64
1madHcNet32.dll
windows7-x64
3madHcNet32.dll
windows10-2004-x64
3mvrSettings32.dll
windows7-x64
3mvrSettings32.dll
windows10-2004-x64
3unrar.dll
windows7-x64
1unrar.dll
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1Analysis
-
max time kernel
49s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
Language/chrome_[1MB]_[1].exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Language/chrome_[1MB]_[1].exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Language/en-US/AutoWorkplaceN.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Language/en-US/AutoWorkplaceN.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Language/en-US/avicap32.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Language/en-US/avicap32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Setup.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
barchan.pptx
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
barchan.pptx
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
madHcNet32.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
madHcNet32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
mvrSettings32.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
mvrSettings32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
unrar.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
unrar.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
vcruntime140.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
vcruntime140.dll
Resource
win10v2004-20240704-en
General
-
Target
Setup.exe
-
Size
3.1MB
-
MD5
b841d408448f2a07f308ced1589e7673
-
SHA1
f5b5095c0ed69d42110df6d39810d12b1fa32a1e
-
SHA256
69a90665113bd73b30360d87f7f6ed2c789a90a67f3b6e86474e21273a64f699
-
SHA512
a689734048109ab7bec9491bbb7781686c19c7885166b3ca2975e2f49e956fcc388cd8ca85a4e5a8bf9efe6056f1e0d80197b7f521d4f0d4cadb10ba9ef1fa93
-
SSDEEP
49152:pvFg5qg9BtIAHE3SM4ahx6LK2SamuZob+tCjNrv8:Jm5qGBHBLRKuZfkjNrv8
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 2348 set thread context of 2172 2348 Setup.exe more.com -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Setup.exemore.compid process 2348 Setup.exe 2348 Setup.exe 2348 Setup.exe 2348 Setup.exe 2172 more.com 2172 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid process 2348 Setup.exe 2172 more.com -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Setup.exemore.comdescription pid process target process PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2348 wrote to memory of 2172 2348 Setup.exe more.com PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe PID 2172 wrote to memory of 1608 2172 more.com SearchIndexer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe3⤵PID:1608
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD56b6e0a487499f1359ff2cc56ed808359
SHA10ac7b38a07bbfae9df076cbb8b9965c93dc07f68
SHA25664524fa167b7a246d0e51407fec589af4bc9a05a849e99c691fcf6ccf423a308
SHA512750cb0ae4bb1392163dd895837b7a51f7183823c5c0ff8aec922e717c663c42e1008c2d79f57a2c409112776ba882fb9e9ca78928fedf100daa185173234c697