Analysis
-
max time kernel
141s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240508-en
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
358eae931ac90e05ab7c9a0b366bfe42
-
SHA1
52610ec198bdb6384c409a5bd1ae40968ad180cd
-
SHA256
60b1eef4db18a8238bcf508687957f79bb2b155abd833b757ffc9ef66fff4b97
-
SHA512
46239cf522b113aaa21596a34627ed458e12bac7ab09b6dfcb48d1311576b655d3ddef2c73e8e72f8ca2d9ed79460627b2de7298bf1e5350daa7a654b24227af
-
SSDEEP
24576:s2UVyQtqa6B5iGRYwVs+93JWvRDTRiJFWqDbTXqtolxjPkFv+Bj/PP0T5e0PU0A:s2LdJLzSJtWWqvTXZlqFWBLPIMg0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 Setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2796 5052 Setup.exe 84 PID 5052 wrote to memory of 2796 5052 Setup.exe 84 PID 5052 wrote to memory of 2796 5052 Setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\is-ERCCR.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-ERCCR.tmp\Setup.tmp" /SL5="$502C4,1410302,52224,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662KB
MD540562e9402a0a03ca26bac1b6e516d31
SHA1807556c46cc5d48a801f1292ef32e42828a7de04
SHA2563d5b9300122520e9eb41cee9598d1ced122f2caa2301ad25e317224736a7a13a
SHA5121c898c59536066d7774b08d056a8e844f40503e698ea181d8c4ddc4c400a3f264cf2d8405d49d7303c308a89572a19a8a15372ff2aab72626c21e1282cbf1917