Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
Mikero_AiO_Installer_Beta_v1.2.1.38.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Mikero_AiO_Installer_Beta_v1.2.1.38.exe
Resource
win10v2004-20240709-en
General
-
Target
Mikero_AiO_Installer_Beta_v1.2.1.38.exe
-
Size
11.7MB
-
MD5
958498eb9d05f56b1e12b747a553e1cf
-
SHA1
ca2772465569c5633212ad1988f28dc5faeb122d
-
SHA256
8468d572e1eba119214b234f458785dbabfc73892bb768f06da605eb67f6a275
-
SHA512
914caeb180fea95295a742b57beddb3e622ad2d446cd56954cdea84683cd01332e74b0f9909a9f7b2d39b4bda635cc57d90fcfc42ff7bd4272e48cda81db9b0c
-
SSDEEP
196608:kTz6fY0q2dtEaqL8yZTYZAmNe30wuk+MjetwrGLzxQCM+cBZ6o:kaftqQzyZ6Aj3uk+HwrsznUQo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation Mikero_AiO_Installer_Beta_v1.2.1.38.tmp -
Executes dropped EXE 2 IoCs
pid Process 4444 Mikero_AiO_Installer_Beta_v1.2.1.38.tmp 3632 netcorecheck_x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4444 3176 Mikero_AiO_Installer_Beta_v1.2.1.38.exe 84 PID 3176 wrote to memory of 4444 3176 Mikero_AiO_Installer_Beta_v1.2.1.38.exe 84 PID 3176 wrote to memory of 4444 3176 Mikero_AiO_Installer_Beta_v1.2.1.38.exe 84 PID 4444 wrote to memory of 3632 4444 Mikero_AiO_Installer_Beta_v1.2.1.38.tmp 85 PID 4444 wrote to memory of 3632 4444 Mikero_AiO_Installer_Beta_v1.2.1.38.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe"C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\is-NLHGB.tmp\Mikero_AiO_Installer_Beta_v1.2.1.38.tmp"C:\Users\Admin\AppData\Local\Temp\is-NLHGB.tmp\Mikero_AiO_Installer_Beta_v1.2.1.38.tmp" /SL5="$801BE,11276274,1536512,C:\Users\Admin\AppData\Local\Temp\Mikero_AiO_Installer_Beta_v1.2.1.38.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\is-KKGOU.tmp\netcorecheck_x64.exe"C:\Users\Admin\AppData\Local\Temp\is-KKGOU.tmp\netcorecheck_x64.exe" -n Microsoft.WindowsDesktop.App -v 8.0.33⤵
- Executes dropped EXE
PID:3632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD55f6469960e0016d44be090160b889077
SHA1114b94c1401d039903e5e8b11cacbb737230365a
SHA256cb5714eb1f8b3938233823f465173c45ccef73e5b0ee122391853a3f2a305294
SHA512a3cacbab7a8a2b0a914b2eb6043f20e60761dbedfefa12fa5353d326370c087845a9eed2024675284449bbcbb8510da72b8832114f003dd2473b45357cf5c670
-
Filesize
3.7MB
MD58959df8d1ecc17d43f2ec1b4ef51f729
SHA1e6066bb7d0df8ec6441a024cc4797ae5c15f951d
SHA2561b7c3b1bf9b7b8120d00a74302d03bad12578b81c131bef78b3b3b1e7bd940fd
SHA512a27100f3cf974b5bef402c00d9c736e507acb8ae78ae595212f29f31675d231f3e0c60018cc2dd2acfa13f4b170aa5b13fee290fb31ef02165450bb192adf8e1