Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240508-en
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
358eae931ac90e05ab7c9a0b366bfe42
-
SHA1
52610ec198bdb6384c409a5bd1ae40968ad180cd
-
SHA256
60b1eef4db18a8238bcf508687957f79bb2b155abd833b757ffc9ef66fff4b97
-
SHA512
46239cf522b113aaa21596a34627ed458e12bac7ab09b6dfcb48d1311576b655d3ddef2c73e8e72f8ca2d9ed79460627b2de7298bf1e5350daa7a654b24227af
-
SSDEEP
24576:s2UVyQtqa6B5iGRYwVs+93JWvRDTRiJFWqDbTXqtolxjPkFv+Bj/PP0T5e0PU0A:s2LdJLzSJtWWqvTXZlqFWBLPIMg0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2596 Setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 2284 Setup.exe 2596 Setup.tmp 2596 Setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 Setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31 PID 2284 wrote to memory of 2596 2284 Setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\is-P8452.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-P8452.tmp\Setup.tmp" /SL5="$90150,1410302,52224,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
662KB
MD540562e9402a0a03ca26bac1b6e516d31
SHA1807556c46cc5d48a801f1292ef32e42828a7de04
SHA2563d5b9300122520e9eb41cee9598d1ced122f2caa2301ad25e317224736a7a13a
SHA5121c898c59536066d7774b08d056a8e844f40503e698ea181d8c4ddc4c400a3f264cf2d8405d49d7303c308a89572a19a8a15372ff2aab72626c21e1282cbf1917