Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 02:43

General

  • Target

    Mikero_AiO_Installer_Beta_v1.2.1.38.exe

  • Size

    11.7MB

  • MD5

    958498eb9d05f56b1e12b747a553e1cf

  • SHA1

    ca2772465569c5633212ad1988f28dc5faeb122d

  • SHA256

    8468d572e1eba119214b234f458785dbabfc73892bb768f06da605eb67f6a275

  • SHA512

    914caeb180fea95295a742b57beddb3e622ad2d446cd56954cdea84683cd01332e74b0f9909a9f7b2d39b4bda635cc57d90fcfc42ff7bd4272e48cda81db9b0c

  • SSDEEP

    196608:kTz6fY0q2dtEaqL8yZTYZAmNe30wuk+MjetwrGLzxQCM+cBZ6o:kaftqQzyZ6Aj3uk+HwrsznUQo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe
    "C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\is-NLHGB.tmp\Mikero_AiO_Installer_Beta_v1.2.1.38.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NLHGB.tmp\Mikero_AiO_Installer_Beta_v1.2.1.38.tmp" /SL5="$801BE,11276274,1536512,C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Users\Admin\AppData\Local\Temp\is-KKGOU.tmp\netcorecheck_x64.exe
        "C:\Users\Admin\AppData\Local\Temp\is-KKGOU.tmp\netcorecheck_x64.exe" -n Microsoft.WindowsDesktop.App -v 8.0.3
        3⤵
        • Executes dropped EXE
        PID:3632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-KKGOU.tmp\netcorecheck_x64.exe

          Filesize

          142KB

          MD5

          5f6469960e0016d44be090160b889077

          SHA1

          114b94c1401d039903e5e8b11cacbb737230365a

          SHA256

          cb5714eb1f8b3938233823f465173c45ccef73e5b0ee122391853a3f2a305294

          SHA512

          a3cacbab7a8a2b0a914b2eb6043f20e60761dbedfefa12fa5353d326370c087845a9eed2024675284449bbcbb8510da72b8832114f003dd2473b45357cf5c670

        • C:\Users\Admin\AppData\Local\Temp\is-NLHGB.tmp\Mikero_AiO_Installer_Beta_v1.2.1.38.tmp

          Filesize

          3.7MB

          MD5

          8959df8d1ecc17d43f2ec1b4ef51f729

          SHA1

          e6066bb7d0df8ec6441a024cc4797ae5c15f951d

          SHA256

          1b7c3b1bf9b7b8120d00a74302d03bad12578b81c131bef78b3b3b1e7bd940fd

          SHA512

          a27100f3cf974b5bef402c00d9c736e507acb8ae78ae595212f29f31675d231f3e0c60018cc2dd2acfa13f4b170aa5b13fee290fb31ef02165450bb192adf8e1

        • memory/3176-0-0x0000000000400000-0x0000000000585000-memory.dmp

          Filesize

          1.5MB

        • memory/3176-2-0x0000000000401000-0x00000000004A9000-memory.dmp

          Filesize

          672KB

        • memory/3176-22-0x0000000000400000-0x0000000000585000-memory.dmp

          Filesize

          1.5MB

        • memory/4444-6-0x0000000000400000-0x00000000007B8000-memory.dmp

          Filesize

          3.7MB

        • memory/4444-23-0x0000000000400000-0x00000000007B8000-memory.dmp

          Filesize

          3.7MB