Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 03:43

General

  • Target

    Setup.exe

  • Size

    53KB

  • MD5

    2745c25c0ee4e08552d296c54337dc51

  • SHA1

    c06e0417cc0f553b126aba37a6136e41a1e8d4de

  • SHA256

    a7e042f4b55742b8ea7c4de4879b5072056bdc0464962d7aa675275d1f108433

  • SHA512

    3d6357a03aa709c616e287577ee2d068da811d96646ee50a3a7297dd59ed311f3dad99ba03c5f40086d7dc6ec26c9029fd7fd7d155d794ce2824ac3bae8fc90b

  • SSDEEP

    1536:NqIOe/QbIdD7UgitDrJV3H8BT2vdBGleQE:me9Dvi5JVpvdBGQQE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 30 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServer
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2748
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe
      "C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVER
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\corecomp.ini

          Filesize

          27KB

          MD5

          62d5f9827d867eb3e4ab9e6b338348a1

          SHA1

          828e72f9c845b1c0865badaef40d63fb36447293

          SHA256

          5214789c08ee573e904990dcd29e9e03aaf5cf12e86fae368005fd8f4e371bd5

          SHA512

          b38bb74dc2e528c2a58a7d14a07bd1ecaaf55168b53afc8f4718f3bf5d6f8c8b922b98551a355ebb1009f23cff02fd8596413468993a43756c4de7dfed573732

        • C:\Users\Admin\AppData\Local\Temp\{1c6212c6-7422-4ee0-a511-71dc9d64bdc4}\setup.inx

          Filesize

          75KB

          MD5

          efadacbe4adc8eee1d4f83f799299c68

          SHA1

          594bf2ddeccf01026a8a4da449f45663478bc10e

          SHA256

          05a06b0f4f01396d7616fe2aa5ca46cd9d6c75baad36645cd68b170c4f0f8f14

          SHA512

          f14f0d7ecb9ccdfd90890b6cd960e7dc20b6fbca897b8adf2779fc7482e43a121db517a50bde58725075629d6621d1b95075feb368a8458caa5193a76bf31408

        • C:\Users\Admin\AppData\Local\Temp\{1c6212c6-7422-4ee0-a511-71dc9d64bdc4}\value.shl

          Filesize

          457B

          MD5

          688023fe40568e997803472422895aa6

          SHA1

          a67172f4420200724e45f41cda5c8ee69bee9802

          SHA256

          26fe9c9b3af707c2826d33136335193ffe5c24faa44f84fc0b112eb3e9cb1d34

          SHA512

          26888adad11c686dbfccbe16c0e379de93493d3e730362e8277d47ed724e3ea5c9493f2cb1523141afbd3b42a878f062181f40cd0598b66350c9ee824ffc935e

        • C:\Users\Admin\AppData\Local\Temp\{532864f7-1e26-484c-94cb-8227d27140e8}\value.shl

          Filesize

          228B

          MD5

          0c3f243b2e9f9c48612c09b7e552adec

          SHA1

          60be6b99fb3d6b6ea942d101baee20e83142768f

          SHA256

          71b672d925e00aeb90be001a0fb196cd2b84d0d3709efa31650f4498d45ffca0

          SHA512

          13aec5170ef52b1e83f898cf769933c9369537a7183aced54e2b4900750b9ecaffedf3098ff269dfd1c66fe092abfe8324da3f368bc2e99cc9e80620f5133bc5

        • C:\Users\Admin\AppData\Local\Temp\{7d74a16c-51ea-4bf8-94bb-ebbd28cc1e32}\value.shl

          Filesize

          402B

          MD5

          42e7e35981779f47b86d78775e0781a0

          SHA1

          ddb1de105bf997053cfb60e48af08165c683db3d

          SHA256

          2f90aab0bdebe51f553f24e3e2aa4d9eb2d04a50c4d2ff7032b26392a977ef33

          SHA512

          415f4c489d83ebbbb0d9cc275609f736d8535e7a6a250740c81cfefa2c50192f5ba6bf56b74f71bfb4473697de1a05bfb5c42640506d66e8e3e2debeab29d47f

        • C:\Users\Admin\AppData\Local\Temp\{A0979E81-9F2F-11D8-B4EC-000C2943B845}\_IsRes.dll

          Filesize

          212KB

          MD5

          37554142e54a38de6d2142ba80353f0f

          SHA1

          6fb0102aa862674169cb7f506ee185ad5299ff19

          SHA256

          0888d2a696ca222ebc35641502548e5b79b55c9f7c094466a1a52d9d4d429a64

          SHA512

          1b3c16d792993569999e0e8271daa4165e29400942e21bcd73423c8d517144aa487d906ef593c7bc67c5877ba3fc098f25386170ddebedf8156f87adc947b181

        • C:\Users\Admin\AppData\Local\Temp\{A0979E81-9F2F-11D8-B4EC-000C2943B845}\default.pal

          Filesize

          1KB

          MD5

          0abafe3f69d053494405061de2629c82

          SHA1

          e414b6f1e9eb416b9895012d24110b844f9f56d1

          SHA256

          8075162db275eb52f5d691b15fc0d970cb007f5bece33ce5db509edf51c1f020

          SHA512

          63448f2bef338ea44f3bf9ef35e594ef94b4259f3b2595d77a836e872129b879cef912e23cf48421babf1208275e21da1fabfdc494958bcfcd391c78308eaa27

        • C:\Users\Admin\AppData\Local\Temp\{A0979E81-9F2F-11D8-B4EC-000C2943B845}\isrt.dll

          Filesize

          316KB

          MD5

          7409fc23b1f3ee88b29677b8dc961068

          SHA1

          755842a4a8e095024d4d8e810870b672ffab266c

          SHA256

          b50d6e5f174c22af8daaf46f55eb87ecd1e155783f25cdb12b4ec3bbed077fb8

          SHA512

          ed5d3c44a1d030a07eed753676150cc0de78783ddb2b9c567853d508ab457f124abd23552c5ca637304ad6214126c1babd3f842cc7821d8141a29f1bb34de0e0

        • C:\Users\Admin\AppData\Local\Temp\{A0979E81-9F2F-11D8-B4EC-000C2943B845}\setup.inx

          Filesize

          154KB

          MD5

          f2fa8565c3f8c74e8324de5495f73eb4

          SHA1

          813c95ab411820185ab7e37e7989ccce3a584e2d

          SHA256

          8ab881f35d077687c608ef1c231125a286b4e86a5e881b016e5386dec211a8b5

          SHA512

          b56ea9aae7df823942723a84bef070e853e59164b58dd31479846302acbf41fe73f58212d5342f601d966306d0846b4de88a1021d4304d0e3ac5202a4d9477df

        • C:\Users\Admin\AppData\Local\Temp\{a5576891-a289-43c1-ad88-ef903d69648f}\value.shl

          Filesize

          550B

          MD5

          64d150deefdcbf831f6400f0acd894a5

          SHA1

          6f2ca5802f02840839f4390c9578574b8f3a4d58

          SHA256

          4e85bfc0e3fc61575a44f07b9e3f6674258e20468d0c75ae37c21b9ca9d93319

          SHA512

          83fcec29a411456c2686bce1345e2d988cd72331ca6d3709d18ec51120b60a0765d4128ccab701ed0032e3e5d1bdb9437f1bde8ed0f7f38c55e9d8cf7780d41b

        • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe

          Filesize

          600KB

          MD5

          f126097fa96e8f93dc85e4173c7f1a18

          SHA1

          69582bd8d919930c959ba80b48422ecf6c59b4a2

          SHA256

          62d416cc6039b22f9eaae9e67ea3283d7a6447506160a88fe0ce3cc85b45fa04

          SHA512

          5326975f294128bc740f1d27dde2e458b24dc37cd23955ee1dead24405fed4dce78598535f2cbed9f1c758e4a906603cd4ca14e7083cd63f91c5a4120b1d3ee3

        • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\ctor.dll

          Filesize

          76KB

          MD5

          003a6c011aac993bcde8c860988ce49b

          SHA1

          6d39d650dfa5ded45c4e0cb17b986893061104a7

          SHA256

          590be865ddf8c8d0431d8f92aa3948cc3c1685fd0649d607776b81cd1e267d0a

          SHA512

          032aba4403eb45646aa1413fdc6c5d08baab4d0306d20b4209e70c84e47f6b72e68457bbc4331a5f1a5fa44aa776a89eb9fd29d0d956fa2fe11364c26ab09ee7

        • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\iuser.dll

          Filesize

          172KB

          MD5

          377765fd4de3912c0f814ee9f182feda

          SHA1

          a0ab6a28f4ba057d5eae5c223420eb599cd4d3b1

          SHA256

          8efcbd8752d8bbfd7ee559502d1aa28134c9bf391bf7fc5ce6fdfd4473599afb

          SHA512

          31befb11715f78043b7684287b4086ce003cb66f97c6eff8c2b438eae29045d8856172c6b898be9f08c139edc4647c2bce000da497aed208b7a5a69d4d90c710

        • \Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\objectps.dll

          Filesize

          32KB

          MD5

          8f02b204853939f8aefe6b07b283be9a

          SHA1

          c161b9374e67d5fa3066ea03fc861cc0023eb3cc

          SHA256

          32c6ad91dc66bc12e1273b1e13eb7a15d6e8f63b93447909ca2163dd21b22998

          SHA512

          8df23b7d80a4dd32c484ca3bd1922e11938d7ecda9fc5fd5045eed882054efca7b7131ea109c4f20d8279845ffeb50ef46fb7419d190b8cf307eb00168746e59

        • \Program Files (x86)\Common Files\InstallShield\IScript\iscript.dll

          Filesize

          220KB

          MD5

          b2f7e6dc7e4aae3147fbfc74a2ddb365

          SHA1

          716301112706e93f85977d79f0e8f18f17fb32a7

          SHA256

          4f77a9018b6b0d41151366e9acab3397416d114fc895703deb82b20f40116ad1

          SHA512

          e6ae396bd9b4f069b5fafe135c0f83718cc236d1cf9007db7305bd5442c86483c0f1e0fad9cd6d547e8715278e23e6fafa973c63ebbe998a31a2153dbbbe7f83

        • memory/1964-68-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2364-0-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/2364-290-0x0000000000020000-0x0000000000031000-memory.dmp

          Filesize

          68KB

        • memory/2364-289-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/2364-291-0x0000000000020000-0x0000000000031000-memory.dmp

          Filesize

          68KB

        • memory/2364-292-0x0000000000020000-0x0000000000031000-memory.dmp

          Filesize

          68KB

        • memory/2364-293-0x0000000002430000-0x00000000024DD000-memory.dmp

          Filesize

          692KB

        • memory/2364-14-0x0000000002430000-0x00000000024DD000-memory.dmp

          Filesize

          692KB

        • memory/2364-1-0x0000000000020000-0x0000000000031000-memory.dmp

          Filesize

          68KB

        • memory/2364-2-0x0000000000020000-0x0000000000031000-memory.dmp

          Filesize

          68KB

        • memory/2432-31-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-280-0x00000000047A0000-0x00000000047F2000-memory.dmp

          Filesize

          328KB

        • memory/2432-242-0x0000000000860000-0x0000000000873000-memory.dmp

          Filesize

          76KB

        • memory/2432-245-0x00000000035D0000-0x0000000003608000-memory.dmp

          Filesize

          224KB

        • memory/2432-250-0x0000000003750000-0x00000000037A2000-memory.dmp

          Filesize

          328KB

        • memory/2432-254-0x0000000000C10000-0x0000000000C3C000-memory.dmp

          Filesize

          176KB

        • memory/2432-259-0x0000000004010000-0x0000000004062000-memory.dmp

          Filesize

          328KB

        • memory/2432-266-0x0000000004320000-0x0000000004372000-memory.dmp

          Filesize

          328KB

        • memory/2432-273-0x0000000004610000-0x0000000004662000-memory.dmp

          Filesize

          328KB

        • memory/2432-30-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-29-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-25-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2432-297-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-296-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-295-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2432-294-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2748-20-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2748-19-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2748-21-0x00000000004B0000-0x000000000055D000-memory.dmp

          Filesize

          692KB

        • memory/2748-22-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB