Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240709-en
General
-
Target
Setup.exe
-
Size
2.4MB
-
MD5
163d5010d21570d380487c576bd3e242
-
SHA1
e12ad02d541c2eab7fc54889e0228c6355f01ce9
-
SHA256
35ac573e802259b969d67866d6376638201951844b1039806869b46bdc4bef96
-
SHA512
d805e8f10350f0ed858310789452cb3c3373ffde12cbb08b88d9c086e6fddc781c3bec7959dbb0200c61cc750ec2b48900fa1bacac9aaa6947b1d477776d6889
-
SSDEEP
49152:BvEuZYhGm29yFlslohoo/2rgT09BdHEVbZC+F0TW5/Ssbgw:hai9yFtK/Z94n3Ww
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4048 Setup.tmp -
Loads dropped DLL 4 IoCs
pid Process 4048 Setup.tmp 4048 Setup.tmp 4048 Setup.tmp 4048 Setup.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4048 4836 Setup.exe 85 PID 4836 wrote to memory of 4048 4836 Setup.exe 85 PID 4836 wrote to memory of 4048 4836 Setup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\is-75VEF.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-75VEF.tmp\Setup.tmp" /SL5="$5029E,1907753,227840,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5ae560d6fa1ce4771c5bc88775009db0d
SHA15183417fa407f7313225948c1e85c7793b231fb0
SHA25640cb43581f731d566ab603c3da45d76693c2c7e5b2e51bd9ae62de8bc5bc7eb4
SHA51230b6683f1f5b0d51d7982e44a04cb034a04f42c88af51ff0c59969faacb1e1c10f481e349e17fb46f27b399f9fe6499a48392a65c9e7d62d1af4d887f0539da7
-
Filesize
65KB
MD5185d31c702a861fd7026c693513eb3fb
SHA14857cba77bce860ee34df70d2ed06ac51958b53f
SHA25656e1b926b344ef760fea6a4fd862e066ea5295f7e5671fc7c0d1f1bc148e2009
SHA5129cabac5d73a9dada0d809fdfbbb552c105d0de975a545fef70322b8c86b001691af6e2dc58e980343342a953bed12d91553dc253928cd6357836b6aaf5efb8e4
-
Filesize
9KB
MD591f97aa4b051e7b2991e5456d2c8655b
SHA1901dd406613f3e97d8d6141bb061b242a3b5fb4f
SHA2560ff3fbfbb177d5ffc8b577f821a91f9d39f13f5f548f9570c12cb85ccef526e3
SHA512b664f7aff75308d416c9e479bbd9a9b840816d41fb1dc218187c01636e443c4c7976a635459f626f971961c89d0b8e3c91bb0d61940e487a36179437fb0aa296
-
Filesize
452KB
MD54feafa8b5e8cdb349125c8af0ac43974
SHA17f17e5e1b088fc73690888b215962fbcd395c9bd
SHA256bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71
SHA512d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc
-
Filesize
22KB
MD53a104b9ff4b59bba6dc3b30114c5b31b
SHA13a03ebe2b3ff5d4bac88355c82a86da3bb30cfde
SHA2561a72008c2393b330c3a9e05bcba070e538d9d5078767adc49a86a05473226ced
SHA5128d4d985d5003b2b7739c9f5549b8ea143adcfa78188fea45de49a73f82dd1e88709ef35a62bdcfdf360a1d3face0cb40fb8ff782d15f5081127dd6121a7e0289
-
Filesize
174KB
MD5022e861243b41ab1b49876c07ff472dc
SHA1369ffa1b9d8072b684a7b4e7b7a8835f4ca11771
SHA2560c1399c2ab0cdfa917e64d4b234401cd1b1c5c793a2d6e3cd837d50950ece440
SHA51201bf1841cb6132150ef1e7b90b8b541848f2936d617d4acf9b916174c28bb96fdb3590e49884aa737bcc9443342b28c7fa46dbaf790375a99544873a93caed70
-
Filesize
7KB
MD5d31d8d275434bd9e5fad19146cde70f0
SHA1e1be0e19762bee1a73349528463f92fc7e65e2b0
SHA256aad4331448574ff4cf51994838e6b41607e8c6542c2f83aa0a465b7cd8792dc3
SHA512b96c81cf9e380855059cc79796aaac50b507c48f4a84aefe5f9a09b9bdcb7a75990fd7a3239340ba5701af50d96cf2037e32d820c3b1f7f77631092ef036f986
-
Filesize
267KB
MD55e25fc73867c51bb749fa958b7c04fdf
SHA17c670bca631e94b46b33f50f1b8ec9d9d203898e
SHA25636cf201c5171646a151b7ff5518078d6068f5437b52557784e4163a8e87a13a1
SHA512e49b15ca8c190eb45a3920f87d652ef9ede95c1b68d48d99e8445373f875d5991fd1320106d2d2130d51484852ade59348b343296be285e127a2d18c3bbbaab4
-
Filesize
19KB
MD5bb562c499c7bebaf0c0b0869f3833538
SHA14de593260cc4833ee3f903e122b39cd346bb1439
SHA2565a497b1f9789ff32c31c033d660e45bf0a2f543a5a7b5e96e3cf4cbedbdbcf4f
SHA512648fe2673dfcb1c679a7f0d9b2c39c5c1166efffdfa473d8bb517d2a7b12733297f8ac30e3b4bb1d6c3bac9d45eebe2199d8db1529dbfaf3f4640c42a60808a2
-
Filesize
9KB
MD51dbec7e15bb3fe912ea362c7f5305cb8
SHA18ee2dca3f834cd7809dd50681bb432fa17f982f6
SHA25643bfe50a575e87237abe4f65eee18b23e667c0a6c9fa1fd6fc2176948edfa527
SHA512dc46536df17a17410a4aa2b6afaee9a620612e23498d009e766411bf2d17c87da0ac3b3f5a950375c34f4355f6b2924dfdc99c52102e1e702fd55f29333fc55f
-
Filesize
37KB
MD5619bf9ddcb5fe39ee9e5b0167e7f4f0d
SHA16da8c0d2407d5221172765b00452efa0f361902f
SHA256609661a14733f6e9c2c2f2ff9c274f8a4cbedaff4dd32049aa5161f8d7083d6a
SHA512a89fc731805e83f889f408fe3fea769d0e44faf1e1dd37d3569bbf57a6086b1ffc8783778e0be8236447c7661c44051b2d4b1d3a643f7ebc35f6ef0625c6897a
-
Filesize
253B
MD55b97ed539eefa61a38c5d8bd75ba431e
SHA1fddf8d18f7c9db64c85f5d7570fc3dbaac03bfe6
SHA256b0034f812ff8f9a71d5e2b21ed1630ace13fe24d70cf558573a4204fb7ed96d3
SHA5129ae322311d28d09e46c92b1ed4bf91c2f11e7d22dc6c2c16498c5e6e960d0e3062169876da4fddb3ef2cca5384b22f213c4380ec85d83ff4d29717e59bb31f08
-
Filesize
1.5MB
MD56e4e83302159ec46e10280abe1d62ce1
SHA1eb439d7b73e64605eb9f37b9b057722861ada267
SHA256bb22238b9de45d10013cdf18b66d13646137bf5ddc075c781a160ef8739b2fd7
SHA51222331088377154be8b11825c95c1a2a8765d71c3394714faed00a6185ab84afac63ae95103f20f1a9e4fe447259976734e1bd905e4a45bbe0567cee5241f1033