Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-07-2024 18:18

General

  • Target

    SMP setup.exe

  • Size

    196.6MB

  • MD5

    927c1c98e8851a3d651cd0567490ff7a

  • SHA1

    0d387869f07337eb3c8897834a3b89c2973165ae

  • SHA256

    27778cca3d3121f8a6d6eb18f184fec5a6180ea37f2019df5e7463dfec0d81f4

  • SHA512

    504585b11345765a0a6838f7de5078084efeba383b4d38556e714048451d91e35f2096c1c61030b31483a30afed88bd20fe85287866d5bfd5d5f71d398c47147

  • SSDEEP

    3145728:2zNGszbqBKca0uR2UbLi2nDKafsCF953TnP6EU1U7j8w0oLxpAwWFLpjqDKCUDk:BTa1R2KiEzd953TP6Um4DAweqWZA

Malware Config

Signatures

  • Detected Ploutus loader 1 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SMP setup.exe
    "C:\Users\Admin\AppData\Local\Temp\SMP setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\is-9P8OO.tmp\SMP setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9P8OO.tmp\SMP setup.tmp" /SL5="$90050,205596299,209920,C:\Users\Admin\AppData\Local\Temp\SMP setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files (x86)\Sonic Mania PLUS\SonicMania.exe
        "C:\Program Files (x86)\Sonic Mania PLUS\SonicMania.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1612
          4⤵
          • Program crash
          PID:868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1612
          4⤵
          • Program crash
          PID:4080
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:408
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    • Modifies registry class
    PID:388
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k GraphicsPerfSvcGroup -s GraphicsPerfSvc
    1⤵
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    PID:4300
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4060 -ip 4060
    1⤵
      PID:4484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4060 -ip 4060
      1⤵
        PID:4556
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4684
        • C:\Program Files (x86)\Sonic Mania PLUS\SonicMania.exe
          "C:\Program Files (x86)\Sonic Mania PLUS\SonicMania.exe"
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 1700
            2⤵
            • Program crash
            PID:5044
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 1700
            2⤵
            • Program crash
            PID:2248
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:764
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
          1⤵
          • Checks processor information in registry
          • Modifies registry class
          PID:3088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1824 -ip 1824
          1⤵
            PID:2696
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1824 -ip 1824
            1⤵
              PID:4992
            • C:\Program Files (x86)\Sonic Mania PLUS\x360ce.exe
              "C:\Program Files (x86)\Sonic Mania PLUS\x360ce.exe"
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Modifies system certificate store
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:2760

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Sonic Mania PLUS\Profile\VALVE\SteamUserID.cfg

              Filesize

              61B

              MD5

              535a0be7708ff23b0b1d65a472a34d72

              SHA1

              b6aa6bfaf0117ec77f6e05387e37306e09e858f5

              SHA256

              7684b45547226dbf1517c5498df52be4e3b4614b98c548c1c0895871bddcc558

              SHA512

              4255c13d4e191030711c1200fe3bb1bd874ba828179388d01cbad4cd8054aac63c74e162aeacdcbc8cb9c2ef8ae2acd4d2d40c52658a7671f9efcb1f1c35bffd

            • C:\Program Files (x86)\Sonic Mania PLUS\Settings.ini

              Filesize

              1KB

              MD5

              30d86fc29674f688ebc4392d628c9067

              SHA1

              32009b17b3b6f15526d31df55710c182e9534f9e

              SHA256

              0b08f7a024d8431636aa500b2c6f51d595a0e1dcf437175c4c8e40d8e8081cd8

              SHA512

              7c11eb0a5f5f297673d8538b936afbfb9175537242ab073a0ee82cd1c9da8d2683745988f592024e538c0497b80e1033b1d71c9c9f3ad5f1816c433eab6abfd2

            • C:\Program Files (x86)\Sonic Mania PLUS\SonicMania.exe

              Filesize

              2.8MB

              MD5

              3a98c304b3fff915ddcf5ac985901362

              SHA1

              2660bbadf31b51a4727ab19299d12e112e9816b0

              SHA256

              bd8e8a208d551b6798bcc77648f77642653ebe0ba44beae555cd70f538663b9b

              SHA512

              66e00f754d4484278382bde5a0fac9627896f17c2771fd89d3da1f4d39ae1d308d87530d30397ade61b1d08dd05d38a647af15c48cefba7af0bfcd3538ed1de3

            • C:\Program Files (x86)\Sonic Mania PLUS\VALVE.ini

              Filesize

              963B

              MD5

              c693c5c19f8cd19f7c72fe98753bcac8

              SHA1

              9d5b34346cf3571023961eee84a21f78fe25a769

              SHA256

              c38a05e4f7d07a1d98e38cecdd9d232e6bac454481ec25c10bc4ad8780b08b3b

              SHA512

              780f5e183a5d74a77755e3604751c83e59e491eb851b2cec2702e7b5df884320b7360266b322af267c8f32dea229b118406f430f8d656b1ec666affcd0852f73

            • C:\Program Files (x86)\Sonic Mania PLUS\XINPUT9_1_0.dll

              Filesize

              123KB

              MD5

              5236623449893c0e1e98fc95f067fcff

              SHA1

              50b4f1e2340b7c7ad065b2111fc075b2cafe6231

              SHA256

              301f0d831d95bb5c3b5c57f8a92a35211531b410fcf2bd08927a286b867142a3

              SHA512

              9b94bddcb5e64bbf3649567f16a828588423873b60858d45c40155f36cc7f95d205f4e9b6cdc8ac2852240fdb6a67d0940c60e4f103cecbf118eae1438019c0c

            • C:\Program Files (x86)\Sonic Mania PLUS\steam_api.dll

              Filesize

              1.2MB

              MD5

              18f1462ac04e9cfa08a0412df6025449

              SHA1

              b0f7258ccfd01f3fbfcb68e9b3e1416a05beae00

              SHA256

              5432b15f9a081e807fa3d22f982d51c60d5a683d31cc467180d73726fb9f182d

              SHA512

              96de56597da5f33fc44098eb5389baff29b47aefba44ea141e0d20afec307bb39b4084f99eeb0d392a6702c3508e63ceee09c9704d1033441e0ee3446e37a4db

            • C:\Program Files (x86)\Sonic Mania PLUS\unins000.exe

              Filesize

              1.5MB

              MD5

              ffa8684fe0b47b55ebc3902f0dfa078a

              SHA1

              5e9efdb6b731725e7f34cfaddbccb7190136a974

              SHA256

              50f2323f2d59828f55aa30e2e1d23e43451db51405cc1d8188edc775eafb33d8

              SHA512

              792da7df204fcb113f775ec13130022cc736d771b2bbc7cd44f480c44c01f434ececb1f14c2961ab02b98076a619670b17c94fba4e9edfce27974877745c391c

            • C:\Program Files (x86)\Sonic Mania PLUS\x360ce.exe

              Filesize

              3.1MB

              MD5

              b6e5bd3c6abd734ac9d66f7dbcdb8409

              SHA1

              485e46c4dcf4d1274eae63932c024bdf9fc52e34

              SHA256

              28e424c515f3724c872fc1d5d79709fa9d13e7986c47fb678b90a677a225abf5

              SHA512

              2e825c315db6761af99385d6be13308bc0f111d024b8a0e9e22d806d54b8312c1864f08799b73ee7b441719fb81d57000cfc5ce7ddc118745ca41226858db67b

            • C:\Program Files (x86)\Sonic Mania PLUS\x360ce.ini

              Filesize

              4KB

              MD5

              589486bf3b287e01feba8611f0c5f283

              SHA1

              785283a6822868372bb738fda07653faba8f1fb7

              SHA256

              955d8ee3f5fb13a1316ff61eb3be9b8bfeb4cdd92bef245554cfb7496d3d24d7

              SHA512

              28ed87f75f54606e554bc88d3d5b1b008eb764c735893f65cee109f78bf7982665f82d5a216f8a3105696b4e8c6b437309ab2e19c857b8980fb389d3dd222f1c

            • C:\Program Files (x86)\Sonic Mania PLUS\x360ce.ini

              Filesize

              4KB

              MD5

              5cf9331c130bfe61b29c1a6aa2bc6c33

              SHA1

              c7fe0116a588677e3d120b8fa01151e37f580741

              SHA256

              f9253821eb2b29a8df8d92d334093671314eaf411416bb00c1d7b3bc55b9badb

              SHA512

              1ce39a7d66ba9d70c2938badc22696c720c61e545acee80f70511c463010a7cc620dcbdbcbbde7c53be07478d2ebc3f678f6ae7b8db53f571632a1c212fe7689

            • C:\ProgramData\X360CE\x360ce.Presets.xml

              Filesize

              182B

              MD5

              f135ee37bdc2bee6bf638994e6a94f0b

              SHA1

              4760b3c9a1bc86f8b57891cedd01ba76a6552e8c

              SHA256

              5a1e6a26433d1c1d5b72ecf67ca89dba3ef9a35192b23640911bbf232c21b458

              SHA512

              94346c7cf89c39440635ce876cba9b56571f7c40372a13717b565d202258586714932a3fcafdd6bbf64b91cc4a924b686de3ab9c2f53afcd6b77e801c1f1d785

            • C:\Users\Admin\AppData\Local\Temp\is-9P8OO.tmp\SMP setup.tmp

              Filesize

              1.5MB

              MD5

              f1137b2a2cd2bd596117090d9f2da793

              SHA1

              f16c89642990d661c24eb7f5db3a410596ea72c9

              SHA256

              361352552d47e35f2aa17f0d866d75135810a49cd8170f0b4050cf283f95a39f

              SHA512

              dd942a0df586c0ef64e8a45669165906566028c31e987ca1946bb9b5f8283e049b2ce2a55dff018529a3290dd8067784399422bf0dcfb7418d18251f2177d087

            • C:\Users\Admin\Videos\Captures\desktop.ini

              Filesize

              190B

              MD5

              b0d27eaec71f1cd73b015f5ceeb15f9d

              SHA1

              62264f8b5c2f5034a1e4143df6e8c787165fbc2f

              SHA256

              86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

              SHA512

              7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

            • memory/1824-127-0x0000000074950000-0x0000000075788000-memory.dmp

              Filesize

              14.2MB

            • memory/1824-129-0x0000000074950000-0x0000000075788000-memory.dmp

              Filesize

              14.2MB

            • memory/1824-124-0x0000000074950000-0x0000000075788000-memory.dmp

              Filesize

              14.2MB

            • memory/2432-25-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-96-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-21-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-7-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-76-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-23-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2432-31-0x0000000000400000-0x0000000000589000-memory.dmp

              Filesize

              1.5MB

            • memory/2760-145-0x0000000006B10000-0x0000000006B9E000-memory.dmp

              Filesize

              568KB

            • memory/2760-144-0x00000000068B0000-0x00000000068DC000-memory.dmp

              Filesize

              176KB

            • memory/2760-175-0x000000000B0E0000-0x000000000B102000-memory.dmp

              Filesize

              136KB

            • memory/2760-171-0x000000000A480000-0x000000000A488000-memory.dmp

              Filesize

              32KB

            • memory/2760-150-0x000000000A920000-0x000000000AC74000-memory.dmp

              Filesize

              3.3MB

            • memory/2760-132-0x0000000000E30000-0x0000000001144000-memory.dmp

              Filesize

              3.1MB

            • memory/2760-133-0x0000000005FD0000-0x0000000006574000-memory.dmp

              Filesize

              5.6MB

            • memory/2760-134-0x0000000005980000-0x000000000599A000-memory.dmp

              Filesize

              104KB

            • memory/2760-135-0x0000000005AC0000-0x0000000005B52000-memory.dmp

              Filesize

              584KB

            • memory/2760-149-0x000000000A1A0000-0x000000000A1C0000-memory.dmp

              Filesize

              128KB

            • memory/2760-146-0x0000000006BB0000-0x0000000006BF4000-memory.dmp

              Filesize

              272KB

            • memory/2760-148-0x000000000A540000-0x000000000A91A000-memory.dmp

              Filesize

              3.9MB

            • memory/2760-147-0x0000000007C90000-0x0000000007C9A000-memory.dmp

              Filesize

              40KB

            • memory/3900-20-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/3900-97-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/3900-2-0x0000000000401000-0x0000000000417000-memory.dmp

              Filesize

              88KB

            • memory/3900-1-0x0000000000400000-0x000000000043D000-memory.dmp

              Filesize

              244KB

            • memory/4060-85-0x0000000072A10000-0x0000000073848000-memory.dmp

              Filesize

              14.2MB

            • memory/4060-120-0x0000000072A10000-0x0000000073848000-memory.dmp

              Filesize

              14.2MB

            • memory/4060-87-0x0000000072A10000-0x0000000073848000-memory.dmp

              Filesize

              14.2MB