Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
drfone_setup_full3399.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
drfone_setup_full3399.exe
Resource
win10v2004-20240709-en
General
-
Target
drfone_setup_full3399.exe
-
Size
2.4MB
-
MD5
b0378a2362f896a18dea96cfb3f69576
-
SHA1
75305b372597eec67ce0e7e06682e8f32123ca3f
-
SHA256
4b12c0bdd99b709a9d64b049a77c8c20decaea52ea3b0492c68a4aa96fa7a9db
-
SHA512
439ad92e737b1c1de945fb4212239ba78360c0da55fe50508dc1cb51e10c03b00e2b0dc75f15664b801401dc22f0346425da9b085d0345c1f491b329c15955e2
-
SSDEEP
49152:rvSzkJnOyQpABa+VsNbwzPZTAY+6Y0fxfNrB0f0uzkfh:rqzkbkbhwzT+b0fxfNrV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4848 NFWCHK.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\Desktop\MuiCached drfone_setup_full3399.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4324 drfone_setup_full3399.exe 4324 drfone_setup_full3399.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4848 4324 drfone_setup_full3399.exe 89 PID 4324 wrote to memory of 4848 4324 drfone_setup_full3399.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3399.exe"C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3399.exe"1⤵
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:4848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d775a0882a9c10ad2e6f17cd381f35c2
SHA1956a1551875c78abe3f0085c0952d6e44d59dc00
SHA256bea03418a6f7c60f00bdde56e5c783ea3daddba76947796b2085eec366206032
SHA5122c11328ef48ec6a36882b96ab0b129df491fab01f3b949fb0edecbce57251e0e5a25e29aa2e507b87bb25e68a73fdaf778aecfa78684c21282e9eb4428bbb4d4
-
Filesize
555B
MD5537dc50ea7e337654018331324478c28
SHA17d36eec335a7b1b1dd2e81821b4013bfcf2dc2c2
SHA256d3bc29c6687a2fd89c5fa3d6daab1139b06e6204dc3bf3c3f59584d20bdd9aec
SHA512bab633c082efcfe4dddff926d865ef8ffefc52834c8c4e8ca3863c9ccf04886c8e0c9b3018b014602eb1e03a9b3f3139a1ddebac5b02b2d483e021ec1a662572
-
Filesize
5KB
MD52089fe3f063f72a0dc2452d67357321f
SHA1bf26026e2253a087c6445646a65b8e280a910cf6
SHA256b8d1d14000ebd10e805e92999099cc06b1855d7666fafcbbe73a7d79b8949ae0
SHA5125a3d6d8fd241b759a8ce78539a782895e31da93768653b4ea91cf49089accc182ecef6e95a7fdac06e33928869f6bf359090df420d932e886dc563282d37b60c
-
Filesize
10KB
MD55e81daa9ee77dbdaff4344ee0fb539ec
SHA1e029ba549ab4be1d15c96bf60f6c266187273e1a
SHA256ffc381ad9d6e70dd5628f1d47d3619d18f136af106e9c6a12a76492573b67844
SHA512a3cea24504ff2c53022ca3e3c18affc635e05d56888b3ffc80b59d92134ac4aaf5f52ec7ab97a75e51fc41bb6b752cba87025161227a40a870a7b8d19c1693b5
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
223B
MD55babf2a106c883a8e216f768db99ad51
SHA1f39e84a226dbf563ba983c6f352e68d561523c8e
SHA2569e676a617eb0d0535ac05a67c0ae0c0e12d4e998ab55ac786a031bfc25e28300
SHA512d4596b0aafe03673083eef12f01413b139940269255d10256cf535853225348752499325a5def803fa1189e639f4a2966a0fbb18e32fe8d27e11c81c9e19a0bb