Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 21:59
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11-20240709-en
General
-
Target
Setup.exe
-
Size
6.6MB
-
MD5
e4301e8ae04291826a336629c424fa74
-
SHA1
c8de33288703388238ae6dfe03c3add4824b987a
-
SHA256
1a060d1dabd86e25cb6aab039a0fdccd176cb033e5c7823164b97b9284e34191
-
SHA512
4d4e79002ec144844db9e85f1b043e4d6a34ded9043c94424834ba010dc369a23ba421cffeea407772ad44f723805ec2e7ae26192b8253b98e0eb01fd48c8918
-
SSDEEP
98304:CaMrs0l5KHUN5EVo4UNPQKD+68kPiz8F+LsxAd8ZFhXGMXRdyf/S1crxA:f+rVWKD3tt+Ls+dmhXGGbmS6rxA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3468 ImLc.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 Setup.exe 3468 ImLc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2964 1752 Setup.exe 85 PID 1752 wrote to memory of 2964 1752 Setup.exe 85 PID 1752 wrote to memory of 2964 1752 Setup.exe 85 PID 2964 wrote to memory of 3468 2964 cmd.exe 87 PID 2964 wrote to memory of 3468 2964 cmd.exe 87 PID 2964 wrote to memory of 3468 2964 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C start /B "" "C:\Users\Admin\AppData\Local\Temp\nsx7ED6.tmp\ImLc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\nsx7ED6.tmp\ImLc.exe"C:\Users\Admin\AppData\Local\Temp\nsx7ED6.tmp\ImLc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD562f06ce16a02ebab81871add6066666b
SHA147c52f3b5dc542d2509bcf1f723598b9b4e88d46
SHA25688c6341f8779755aa42bf23b70f28a3835cb9e910cb3f47a1e79b8e959061184
SHA51282a27a06f1aa5bbf83c697423ae433cbcd1738642c576398b32830b42223811d4cb7623aee24a7e5e77cdf3bbf3a2727120a4d16dcd5ffc6d19c6bd34134ff6c
-
Filesize
606KB
MD53ea6d805a18715f7368363dea3cd3f4c
SHA130ffafc1dd447172fa91404f07038d759c412464
SHA256a6766c524497144d585efa4fe384b516b563203427003508f7c8f6bffa7c928d
SHA512a102f23741de4ca2184485d9aa4ddd1a36b9ea52cb0859cfd264d69a9996293b7e29b325625f1f6f9330d6c80ff415e09e85e1ae838c58acef585ae8dffe3070
-
Filesize
1.4MB
MD511d04f26d2fddde31baea41874db2dc9
SHA1934492f00d56ea6a3aa2a41661529704e847c539
SHA25601d00bbe1bb408c06417092f3e35c90d29fe4ee6a697e4e99c98c9891d852274
SHA5124819cc1b1e924aaac97642bc0b566012547cfbac02721ab63ebdc039d88f81957d1de4089a47c645bd0f9f09de3c52f7ccdbcaa78005b2b335adc5dadc52b212
-
Filesize
158KB
MD5cbf4827a5920a5f02c50f78ed46d0319
SHA1b035770e9d9283c61f8f8bbc041e3add0197de7b
SHA2567187903a9e4078f4d31f4b709a59d24eb6b417ea289f4f28eabce1ea2e713dce
SHA512d1a285fb630f55df700a74e5222546656de7d2da7e1419e2936078340767d0bab343b603ba0d07140c790eb5d79a8a34b7818b90316ea06cb9f53cad86b6d3f5
-
Filesize
11KB
MD5d65973e31f6324acfb9669a98fb1d375
SHA1bde1e7963b46366d186190ba69eb8530ad64572b
SHA2569e1b4a31bedcbfecbafb4f0b3248bff00f1cc590b03dd41797d5dd39979e27b7
SHA51229edd129f47174c16ffe964bbd50551c9b7edea038563cda0bdea90229827b23fbe01c765b7c9d2719df4edd58b30755b5d79e9cedc26b43c8833082bfc5c601