Overview
overview
10Static
static
1!~!SetUp_2...!~.zip
windows7-x64
1!~!SetUp_2...!~.zip
windows10-2004-x64
1!~!SetUp_2...!~.rar
windows7-x64
3!~!SetUp_2...!~.rar
windows10-2004-x64
3Setup.exe
windows7-x64
5Setup.exe
windows10-2004-x64
10avenue.css
windows7-x64
3avenue.css
windows10-2004-x64
7d3dx9_43.dll
windows7-x64
1d3dx9_43.dll
windows10-2004-x64
1heartthrob.doc
windows7-x64
1heartthrob.doc
windows10-2004-x64
1Analysis
-
max time kernel
76s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-es -
resource tags
arch:x64arch:x86image:win7-20240708-eslocale:es-esos:windows7-x64systemwindows -
submitted
11-07-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
!~!SetUp_2025_Pa$$W0rd$s!!%!~.zip
Resource
win7-20240705-es
Behavioral task
behavioral2
Sample
!~!SetUp_2025_Pa$$W0rd$s!!%!~.zip
Resource
win10v2004-20240709-es
Behavioral task
behavioral3
Sample
!~!SetUp_2025_Pa$$W0rd$s!!%!~.rar
Resource
win7-20240708-es
Behavioral task
behavioral4
Sample
!~!SetUp_2025_Pa$$W0rd$s!!%!~.rar
Resource
win10v2004-20240709-es
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win7-20240704-es
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20240709-es
Behavioral task
behavioral7
Sample
avenue.css
Resource
win7-20240708-es
Behavioral task
behavioral8
Sample
avenue.css
Resource
win10v2004-20240709-es
Behavioral task
behavioral9
Sample
d3dx9_43.dll
Resource
win7-20240704-es
Behavioral task
behavioral10
Sample
d3dx9_43.dll
Resource
win10v2004-20240709-es
Behavioral task
behavioral11
Sample
heartthrob.doc
Resource
win7-20240708-es
Behavioral task
behavioral12
Sample
heartthrob.doc
Resource
win10v2004-20240709-es
General
-
Target
!~!SetUp_2025_Pa$$W0rd$s!!%!~.rar
-
Size
2.5MB
-
MD5
84abceea44fad10e5bffa5ca322472b8
-
SHA1
16cc411b420af41a0ac0f93d9bf83a9b4fd5bf74
-
SHA256
e4e4ac4b8b98caa320ab253c20f011777af08d212a0fa2d499704458b739a03e
-
SHA512
197cf374219f72325334707ead6c6c63d58b57bf8c525b3b6fbd72926c97d72288a908a224a709ca4f5a1398d9ddc17f107652ddc1b29720708844ef4d026f82
-
SSDEEP
49152:Dl+vhucarEtODXytKmaAHh0ozFBfPHMxduALsKOg2YXA4dWEIJ:J+srEtsytLhh0OPMxEAL5aqLWEO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid Process 2548 rundll32.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
rundll32.exepid Process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2512 wrote to memory of 2548 2512 cmd.exe 31 PID 2512 wrote to memory of 2548 2512 cmd.exe 31 PID 2512 wrote to memory of 2548 2512 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2548
-