Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
setup.exe
-
Size
2.1MB
-
MD5
09b0e22ca80e349af682a07f8a2de3f0
-
SHA1
db9de2293ac459113df605dd035960b568a78af4
-
SHA256
d5ef4e3379ff4e37f1e3d8fbb9b9dc6ec9ccda854dcbe1dbcd9d0b429bd3e8c5
-
SHA512
a5376acffaaf6dfe673cf4db49b9f4d6ccd42beb196aaeee18a88c12f7ed7651014eeb2c1464b45cae5e91f8dbd63c89502d45e00151783947c608f08f6d7385
-
SSDEEP
49152:D2NWpPHccZvyQY9uMD1pFKS+4noZtUaqinxkyWTWRSmII3Ra/sO/M:qNoPiQst1CZlZtUayu3RaZ/M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 1724 setup.exe 2416 setup.tmp 2416 setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30 PID 1724 wrote to memory of 2416 1724 setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\is-SN341.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SN341.tmp\setup.tmp" /SL5="$5014E,1914977,52224,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
662KB
MD5b45570ddb00885bfe9e878af91a90564
SHA166daf059333962a65735999e99eb868cf9d5e832
SHA25629fedae831f5b1704e5b53351cd6b8d33a21b7971894a9d0385895d7662e264f
SHA51284350f30f9372be749fa244190b7d35a02aa2ce1ded9b45d89c29135a384e1170a54ef1af7004836ab9c30770a44f7e085b0cb238786a6d93d7e8cdec993d768