Analysis

  • max time kernel
    147s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 01:40

General

  • Target

    setup.exe

  • Size

    27KB

  • MD5

    8bf8d9d1ec6093701cb0694f269d26fd

  • SHA1

    e3a7c8ad993c5771792434c48e823f86b6a89640

  • SHA256

    fa5c38f264aba0e77e8752feb1ce2dfec1cf80154c136e8b816f251f1ac2ab76

  • SHA512

    ee06a25a995c77672f13ca6c9fc5477cb50c964ef4b50b4fa0dab38a72c62f5f2485cb4d54e1edcc8f504d0ed22b420f0d931cccb4b529b0db2761ab68c5a42c

  • SSDEEP

    768:ADTNi7eKAKn3zSVy/E7fI34RocT/etFbZcoQiw/ZOuYoE:qBi7e6zSFPX/eioQiwbYH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 63 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Program Files (x86)\WinHex\WinHex.exe
      "C:\Program Files (x86)\WinHex\WinHex.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\winhlp32.exe
        winhlp32.exe -x
        3⤵
          PID:3048
    • C:\Windows\helppane.exe
      C:\Windows\helppane.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\WinHex\language.dat

      Filesize

      191KB

      MD5

      7861cb55b7d23012130a3b2284d0803d

      SHA1

      6a3475a9c29731a1c65205341fa8d18c377df915

      SHA256

      9ae718f4dafcd9da1e55e2a4b657a991653d73c8b5fe4611f7414cef382398d0

      SHA512

      ab54aafa69d7b51c81ab57216fa6d3e67882a23126e7381d973c094e924e469f302384eddc8b1b306174b7a81b9ec7f8982e161c216a6311345f18ce86a5d980

    • C:\Program Files (x86)\WinHex\timezone.dat

      Filesize

      2KB

      MD5

      843affb88952e79d8c1e8a49d504a985

      SHA1

      13155598b4177bb92eae44b49fe40a580b924777

      SHA256

      1cfc1a7a614e4cbf35d335d93c9130c0bb4ed55dca727b277a1537213a360e17

      SHA512

      4e99f9e2f2f18af2dc942dc67a40e1939e85f537e528284b0eb056b6775326128fa7526b5feb40f3c861e5bd0e4f96a9591c119dc16955efdf15e2a04d6e2c3d

    • \Program Files (x86)\WinHex\WinHex.exe

      Filesize

      1.4MB

      MD5

      0bc48abad1ce6dc97a649e42f31d668f

      SHA1

      66b405640d43de81951e6202c2d7c239949ed6a6

      SHA256

      8fb578ca01388b5e2d6749418ee072d1b52a7c03e0aebcf0265f88f74d68e138

      SHA512

      a5f4ddfa5d9123b9705b77b8ca801e72bcadf30a6e8c380284f4ab5357ad02c88a31471e8c09b469d70d2158861cc793fb2c91303f183779727c5bb63bfed19d

    • \Program Files (x86)\WinHex\dialogs.dat

      Filesize

      150KB

      MD5

      45c6e0a1949c5c4feecfa8c66fdab2a6

      SHA1

      50d286260a53b616168c85553e2b27a0b061afca

      SHA256

      2f7eac54a270466b035590faa774e6c6450f81645d5d5688227e75230f8b7b7a

      SHA512

      1dc516a3879bef83f76cd2f88bf0d1cb93685a890e5937b74b8de9d1d0a5abcef7834e69d9759e744183c23fd0dd7cd63b1b96363b39c5a3c36caa993eefc75d

    • memory/712-0-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/712-52-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2688-81-0x0000000000730000-0x000000000075B000-memory.dmp

      Filesize

      172KB

    • memory/2688-80-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-84-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-86-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-88-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-92-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-94-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-98-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB

    • memory/2688-100-0x0000000000400000-0x0000000000599000-memory.dmp

      Filesize

      1.6MB