Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 04:46

General

  • Target

    FPC411/install_flash_player_active_x.exe

  • Size

    1.2MB

  • MD5

    2d4b0f75ab3b1d4b41cebd80708cb8ac

  • SHA1

    25b262c619c29c0c472684deb2e7b8e5febd920b

  • SHA256

    ad1601efde80b1eb3c631b6865da3d02ece5f880fc9e86e890afaa956201986d

  • SHA512

    0fe9c2036e73e092c16ff8ac7018a8a68bdb74010c10bcebf25a25c5fe215396de2b4f283650a86a83d561878ae58549d12caeaa00b70ec8d2871906e938ee8c

  • SSDEEP

    24576:4UdWyV02uMTFHrNxVXDhTjlgfPkzd3JjRoUWW6NjR5qYo8:4Uh/LjVX1jSkzd5my6N1nl

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FPC411\install_flash_player_active_x.exe
    "C:\Users\Admin\AppData\Local\Temp\FPC411\install_flash_player_active_x.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    PID:3600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsr7E68.tmp\NSISArray.dll

    Filesize

    17KB

    MD5

    2b8574f6a8f5de9042baa43c069d20ba

    SHA1

    07959da0c6b7715b51f70f1b0aea1f56ba7a4559

    SHA256

    38654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564

    SHA512

    f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88

  • C:\Users\Admin\AppData\Local\Temp\nsr7E68.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • C:\Users\Admin\AppData\Local\Temp\nsr7E68.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    68d73a95c628836b67ea5a717d74b38c

    SHA1

    935372db4a66f9dfd6c938724197787688e141b0

    SHA256

    21a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226

    SHA512

    0e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914

  • C:\Users\Admin\AppData\Local\Temp\nsr7E68.tmp\fpinstall.dll

    Filesize

    3KB

    MD5

    7d448e856571c3cc9a403d62e429484c

    SHA1

    75698fd133c13ad2fc8e234254a492d686900dfd

    SHA256

    5a70946e57565d9e4327d3832f3e2d836608c3c4408394752d690fe9a5687d50

    SHA512

    903f4564f84fdc4e65f98f0abe99cf18692f349fcc168677b3424bd46d358c0380f8f2f73bb9091f04086698b9795f5b7a6695c60d6b4d6aecae19742468003b

  • C:\Windows\SysWOW64\Macromed\Flash\Flash9e.ocx

    Filesize

    2.3MB

    MD5

    38010f8b9dc0e06cc78ab871c15b7e6e

    SHA1

    82baa8d12bd0b68b183328e463eedc16613001ed

    SHA256

    ccb605076d0f6211621956c0295eff4d408574bc7fb766fdb8b1cd4be05d76bc

    SHA512

    dedb52556297fba187e0fab285ad7a61956a7036fc068c653e8dfadce98758ea7125fe09d25a1da6f2b408a052f40edbab29298e579f8e9e4f4da2f4d889dec8