Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
!ŞetUp_64851--#PaSꞨKḙy#$$/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
!ŞetUp_64851--#PaSꞨKḙy#$$/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
!ŞetUp_64851--#PaSꞨKḙy#$$/tak_deco_lib.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
!ŞetUp_64851--#PaSꞨKḙy#$$/tak_deco_lib.dll
Resource
win10v2004-20240709-en
General
-
Target
!ŞetUp_64851--#PaSꞨKḙy#$$/Setup.exe
-
Size
12.0MB
-
MD5
a7118dffeac3772076f1a39a364d608d
-
SHA1
6b984d9446f23579e154ec47437b9cf820fd6b67
-
SHA256
f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0
-
SHA512
f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890
-
SSDEEP
98304:ReAtQzKADvk/9TEaImN9/tiHBIn8c3hCEFRUTaZnPZOtXwH:ReAOWOM/FE1mNHiFc3hr7UTaZnhOtXwH
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 1600 2312 Setup.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2312 Setup.exe 2312 Setup.exe 1600 more.com 1600 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2312 Setup.exe 1600 more.com -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1600 2312 Setup.exe 30 PID 2312 wrote to memory of 1600 2312 Setup.exe 30 PID 2312 wrote to memory of 1600 2312 Setup.exe 30 PID 2312 wrote to memory of 1600 2312 Setup.exe 30 PID 2312 wrote to memory of 1600 2312 Setup.exe 30 PID 1600 wrote to memory of 3056 1600 more.com 33 PID 1600 wrote to memory of 3056 1600 more.com 33 PID 1600 wrote to memory of 3056 1600 more.com 33 PID 1600 wrote to memory of 3056 1600 more.com 33 PID 1600 wrote to memory of 3056 1600 more.com 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe"C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe3⤵PID:3056
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD5d49c42ef4268c38d0394e36c28a46e33
SHA107001f61241d74653845c3ed4e66f3c0b605b644
SHA256da469ba8795f82672d4e89500b701b17f10fbaea2a6ea98323fed6fcb4d18b81
SHA512bd85835fea8e7a120a5542ee1be226ffaba9aa3a651d08fa676cadd591972b65dcee1d6e3d7f7b8914666f9b82b76b0d30590ebf1413021f445afab6c004e430