Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240709-en
General
-
Target
setup.exe
-
Size
45.9MB
-
MD5
c0f835c27793a4af61fbfe851e41c61b
-
SHA1
e13c361912723d02f90aaaecb1db7a8b10f05c8e
-
SHA256
8b4f3b6766beb4e90ba462610d192408d61138155f5bb012b8ff898e1f0bc3af
-
SHA512
c3bc9f15c93eaa1ebdb6676d8beddc6100aa79d523bd598aec47541f4ec978e1b5904b9468bbdf9459076344c5fff122e4e59d6734d378379d28cc1eb661df7a
-
SSDEEP
393216:A4wUMfMvgtQjIOlTTvwTzRMPIaZ2X+060hYTTdOALQWQziLPDc56f7e3RqaospV+:GfMUQjIQTzwiIKlnLKGbK3Rq6qu/G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2096 setup.tmp -
Loads dropped DLL 5 IoCs
pid Process 1920 setup.exe 2096 setup.tmp 2096 setup.tmp 2096 setup.tmp 2096 setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31 PID 1920 wrote to memory of 2096 1920 setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\is-ANPLT.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-ANPLT.tmp\setup.tmp" /SL5="$400EE,47874797,53248,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD5acec08a952e0b9a24afe1f95bb335e11
SHA1edd75d5928d96c0eddae2fc88bc52787357acc46
SHA25652976fc5d14c217b0b50f4c95e81cd82494430035d15bbcd586303f6b5f63b44
SHA51293b3a2964857e0cb3ef4425a33279b16f7a914d1ce585406141f81680ce9a469f41c4199cfc3acaf0246a4d978dcbf22bfa68978217054c9b04b93b8280716a7
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
299KB
MD5d6c79afef36773206e479e0b1a7cf059
SHA15faa19aa1629e401915001a3392e3d916be38578
SHA2565b08aff352a39b7e10efdaa99efb27e02c2fe16b6e5c2e4c14b84a64eee86d6b
SHA5124016292d81779f635baf6f5756b6f07474a0265d3845a02937d30422427e11e5b27b8494689ebd6242c07f50642d2b2d3589f43d97b3b121927fb99bb1c2c5e2