Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
SpywareTerminatorSetup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SpywareTerminatorSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20240802-en
General
-
Target
SpywareTerminatorSetup.exe
-
Size
9.8MB
-
MD5
62f201abe0233a30511fb349ce2dfac4
-
SHA1
caca9ce6865b57381561734c920a5589bb7abc20
-
SHA256
a1684a313ef0a6735e25e2333ad3199260eb67693bbe61fb517dc1493a8d8899
-
SHA512
a13c214caf0e204c5bf422ab635ed6991b00389820dba05984165b238cb1a55401b7ab086217cc752d4cc2cf530197d964f83e23405bc448b0aba025944d28ce
-
SSDEEP
196608:XOO5u7mPe7OKZYS/63IDih6Ua26yQPc8g0LJD4leadZX1dRb:XOO07mPe7OsYS/kMif3zps4sadZfRb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 is-CQ25C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-CQ25C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1672 1236 SpywareTerminatorSetup.exe 87 PID 1236 wrote to memory of 1672 1236 SpywareTerminatorSetup.exe 87 PID 1236 wrote to memory of 1672 1236 SpywareTerminatorSetup.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\is-M9MQB.tmp\is-CQ25C.tmp"C:\Users\Admin\AppData\Local\Temp\is-M9MQB.tmp\is-CQ25C.tmp" /SL4 $901D6 "C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe" 9948545 522242⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651KB
MD5d1c662e7e7cbf0219b370b8b6854963f
SHA197f830c860b2b725d5df3d47649212c3c2a75f55
SHA256450a9e2ddcb98150059fec666f7f661a8d2d5121d44a9a042ee75dd42df69309
SHA5123091e8dd41f627ab6aae1a7e418492a47c74580047d38c62d3fb86fe8b57b02ebad905ed2fd58e5c619594082d0fe195fc9c0b047a9f3f589a32f37ff4a59b7f