Overview
overview
10Static
static
1!ŞetUp_92...ot.dll
windows7-x64
1!ŞetUp_92...ot.dll
windows10-2004-x64
1!ŞetUp_92...ee.dll
windows7-x64
1!ŞetUp_92...ee.dll
windows10-2004-x64
1!ŞetUp_92...up.exe
windows7-x64
10!ŞetUp_92...up.exe
windows10-2004-x64
10!ŞetUp_92...se.dll
windows7-x64
1!ŞetUp_92...se.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1acdbase.dll
windows7-x64
1acdbase.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1assured.doc
windows7-x64
1assured.doc
windows10-2004-x64
1ezcd.exe
windows7-x64
10ezcd.exe
windows10-2004-x64
10libmmd.dll
windows7-x64
1libmmd.dll
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1!ŞetUp_92...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
96s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/AbRoot.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/AbRoot.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/AdTree.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/AdTree.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/acdbase.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/acdbase.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
acdbase.dll
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
acdbase.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
api-ms-win-crt-time-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
api-ms-win-crt-utility-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
assured.doc
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
assured.doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
ezcd.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
ezcd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
libmmd.dll
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
libmmd.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
vcruntime140.dll
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
vcruntime140.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
!ŞetUp_92517--#PaSꞨKḙy#$$/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240709-en
General
-
Target
!ŞetUp_92517--#PaSꞨKḙy#$$/Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
Malware Config
Extracted
lumma
https://unwielldyzpwo.shop/api
https://bouncedgowp.shop/api
https://bannngwko.shop/api
https://bargainnykwo.shop/api
https://affecthorsedpo.shop/api
https://radiationnopp.shop/api
https://answerrsdo.shop/api
https://publicitttyps.shop/api
https://benchillppwo.shop/api
https://reinforcedirectorywd.shop/api
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Setup.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 2752 1740 Setup.exe 84 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3} Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ = "PSFactoryBuffer" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InProcServer32 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InProcServer32\ = "C:\\Windows\\System32\\Windows.Graphics.Display.DisplayEnhancementOverride.dll" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InProcServer32\ThreadingModel = "Both" Setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1740 Setup.exe 1740 Setup.exe 2752 more.com 2752 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1740 Setup.exe 2752 more.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2752 1740 Setup.exe 84 PID 1740 wrote to memory of 2752 1740 Setup.exe 84 PID 1740 wrote to memory of 2752 1740 Setup.exe 84 PID 1740 wrote to memory of 2752 1740 Setup.exe 84 PID 2752 wrote to memory of 5108 2752 more.com 86 PID 2752 wrote to memory of 5108 2752 more.com 86 PID 2752 wrote to memory of 5108 2752 more.com 86 PID 2752 wrote to memory of 5108 2752 more.com 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\!ŞetUp_92517--#PaSꞨKḙy#$$\Setup.exe"C:\Users\Admin\AppData\Local\Temp\!ŞetUp_92517--#PaSꞨKḙy#$$\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe3⤵PID:5108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b9e4b48b4ebeb97843ccadde063948eb
SHA16999b6d97f7c5908c022dc27da701158b5d63869
SHA2565cf2ef04f987382061c276aa5969e3ceb07edbfc94ddc4329d76b9c3e7d5516a
SHA51222a7b46f0d7f1890543e793ccc9c2c9412090406538e3325ce464bbbcecfc3bbe63699fbdf09fa342e960a40cb6c2d211873369d8a5d3f668dbc0048786dfb2e