Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240709-en
General
-
Target
setup.exe
-
Size
12.1MB
-
MD5
fe25f09e29df53e39ab8d42f43118cc6
-
SHA1
c9278cc39bfec67a22a15a42ace48fbceda43a4c
-
SHA256
b97dfde6fdd65926a365a09c07659dc826d3320afab9e8592b1d9c719c40893d
-
SHA512
ec299e0e30c7caeb9b2ecb5767a4be206e755439b01a435a95241fa87ae569f336ea8120d80e5582cadfe6568e3a3f5bd65bb968283a0edd158ab3372b3eca0d
-
SSDEEP
196608:UPt4bMzTfBmAVaQEC7dMk8fnvwEXomQivrMGyY2jKmvNU1eBo+9rMYFAPvbo/Iwv:UPabMzTfB/stUMk8vRtqemvEyMCdkah
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 is-8F67M.tmp -
Loads dropped DLL 3 IoCs
pid Process 2372 setup.exe 2712 is-8F67M.tmp 2712 is-8F67M.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 is-8F67M.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30 PID 2372 wrote to memory of 2712 2372 setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-CGJ2L.tmp\is-8F67M.tmp"C:\Users\Admin\AppData\Local\Temp\is-CGJ2L.tmp\is-8F67M.tmp" /SL4 $40152 C:\Users\Admin\AppData\Local\Temp\setup.exe 12423539 506882⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5a590f14ae2b8349d23316b1f5e22104c
SHA18b78ab3351371f9a8fe613651a78bdaf6af19bf0
SHA256c8d975b37748415c0a53f15c4cdbded81cf82abecde918e1ff7b3b42bbe7e3a7
SHA512ef5d46e4ccbf80a3c73358198e4a2e1a3ec92da61e18700cd472394425f0bd49b6296fde4f1eecfaca0bdf90563e960d50ed1761dce93c9aa170378ba3492994
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3