Analysis
-
max time kernel
138s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
General
-
Target
setup.exe
-
Size
25.2MB
-
MD5
3b4d57b21bb78c31d314aa15dbccd507
-
SHA1
c5e9b2f1ab4465d078741fca18a0397772109e3b
-
SHA256
f8091bf9f970c2cc7d8fc2909138ad927190f34d8af204186861cadbe4e0d3cd
-
SHA512
714d6af53dc01c975c74ad977bbbc767be86b346e789a4bf10b224eb617bebf8490f0ddc0c3f743aaf4cea06c0e16d498843818914105ff5a2b6d938616b5240
-
SSDEEP
393216:To4f9XPvmpQCVki/X5aGounReVI7ZoNVNgEMLJh6Za6uyYx:9hX2QCuQXIG7RyI1oNVN6Lqfs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation setup.exe -
Executes dropped EXE 1 IoCs
pid Process 1852 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1852 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 6 IoCs
pid Process 1916 taskkill.exe 3428 taskkill.exe 4860 taskkill.exe 1332 taskkill.exe 632 taskkill.exe 4424 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1916 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe Token: SeDebugPrivilege 632 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1852 1568 setup.exe 89 PID 1568 wrote to memory of 1852 1568 setup.exe 89 PID 1568 wrote to memory of 1852 1568 setup.exe 89 PID 1852 wrote to memory of 2452 1852 setup.exe 93 PID 1852 wrote to memory of 2452 1852 setup.exe 93 PID 1852 wrote to memory of 2452 1852 setup.exe 93 PID 1852 wrote to memory of 3620 1852 setup.exe 95 PID 1852 wrote to memory of 3620 1852 setup.exe 95 PID 1852 wrote to memory of 3620 1852 setup.exe 95 PID 2452 wrote to memory of 1916 2452 cmd.exe 97 PID 2452 wrote to memory of 1916 2452 cmd.exe 97 PID 2452 wrote to memory of 1916 2452 cmd.exe 97 PID 3620 wrote to memory of 3428 3620 cmd.exe 98 PID 3620 wrote to memory of 3428 3620 cmd.exe 98 PID 3620 wrote to memory of 3428 3620 cmd.exe 98 PID 3620 wrote to memory of 4860 3620 cmd.exe 101 PID 3620 wrote to memory of 4860 3620 cmd.exe 101 PID 3620 wrote to memory of 4860 3620 cmd.exe 101 PID 2452 wrote to memory of 1332 2452 cmd.exe 102 PID 2452 wrote to memory of 1332 2452 cmd.exe 102 PID 2452 wrote to memory of 1332 2452 cmd.exe 102 PID 3620 wrote to memory of 632 3620 cmd.exe 103 PID 3620 wrote to memory of 632 3620 cmd.exe 103 PID 3620 wrote to memory of 632 3620 cmd.exe 103 PID 2452 wrote to memory of 4424 2452 cmd.exe 104 PID 2452 wrote to memory of 4424 2452 cmd.exe 104 PID 2452 wrote to memory of 4424 2452 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\ASC-31B5D6DD\setup.exe"C:\Users\Admin\AppData\Local\Temp\ASC-31B5D6DD\setup.exe" "C:\Users\Admin\AppData\Local\Temp\setup.exe:rzr"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\asc40788765.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\asc535B3CFD.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /T /PID "1852"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
986KB
MD51b2b92e47577fd988d460ab88a074fb6
SHA1f3974cfd87958fe14816e070c03e1307061b9df7
SHA256312f6720417c504875c8fb584e6e7f48dd580a9716f3defa6874d64913725322
SHA5126c4917516553eb8397a766b3c3c74d7274b34dbd74203d86aeba87423ecda15d15077a796777837cb531171825926d6444f57aa515eeb40b059a3956ea363162
-
Filesize
1.6MB
MD53dea6da513097358f7fbb4408aacb736
SHA1649a1ed83f061c390fa87238303393c082360181
SHA256198e8dac512206f27c9bdbfeb3d5b3e55a33de9dcf58d801823ef8c5ef5a76dc
SHA512d85d246e9c2ef6bb2fa9ff38b9fd6ad2e568791fe2e6d4ab8499f7485967cd2136e102c4d3644079df240ec8a4fc778df5bf983d80dad6df21ea82a6da105934
-
Filesize
3KB
MD5cb0491e649cd80dd01a2a0665c5fac61
SHA1ceb11fd3c8de2f39a89e899b7bb4a709931dabb9
SHA2564169e365dd5cda873a0168c19741c64df57ecb0bb81b9e3fb35924ea31373d1e
SHA512654cedd4379c06813637b6201d2f8f6a6d27243617e268ff3ed0b3243f39a9094122cf14665f33a4444f502deff629e9b338c91fbfbb5a115de8db6668245af5
-
Filesize
53KB
MD59c189f430364681992ecc231f2e97d3e
SHA1775ff03787704c9461e3c5d26496a751208c815a
SHA256adac3ca9797b4a655ec4b9b664699232dd0a7285290e0ce628a7c606a3cf902e
SHA5120870ae7efbe832a1bff9c307936ebb62c7e18b3ee001d6aab91bc81ccf8a63b260b5dbdbe1757c6f9873a71ffa2e7b369112f62145655ab2a0b90e193c939528
-
Filesize
188KB
MD5fd77e4e8a95e27848d4a84a7d81ec48e
SHA18fed4364b4a9b94f3f2f58a41c39bf3cf34918ba
SHA2561e3346ade4bed1272aa8d14da02b0513628ff0bc09399cc7988ed3c28b78b542
SHA51238fe2be69f197da0b9bf98ed957e33e906e4862134d5ea61033343c0577ca8cb6d2a7989bb1034eba0071a21442fc000b5ff31a10ed18f459161f4b4542eef33
-
Filesize
25B
MD5f990f261625cb01d59acc66f4f94f18c
SHA1d432599ef2fc0298215cbbde3a6c73ddf54c8c97
SHA256cb58b743a5f185fb56dd5813cefe49b6b85d580e67ec6eca9289040a6a60d4ac
SHA5129df69053584fd31800982f44c871add6aa9377fee0385ecc632e95b0a2e53da8cbbda3a1413cfc663abd10269073b42e423f007e91a894706b189eaeed2f8e2b
-
Filesize
152KB
MD5b5491550c16d4a9815c39da1c31df4d9
SHA173e0272d7bb5213643a5edf72aafda146d3d8742
SHA256803798aa8bb014698115960b165c49499c00a77bfb4bc61cd0544b5da76023a9
SHA5125e603b98d63068249c47a8d0c525edbee9cae90e75866c17b2a1ecb397d21a852c3828d50605aaec24ec1e7168fd92d2e5d641c9240e74d82335760028cd9a2a
-
Filesize
25B
MD541f42caeb390616f21a8096b49e881ac
SHA17a65c8bbef2817b6f4ae3cdf2055ddefe7714018
SHA2561fcf97a10779214586278b5f4814393c16a4d02ab6426fb809d9bb983a9f837e
SHA512c543adb3144c4e6fe78b14332360e16d8a810a1187a6c3a6c7696224462356d7a82632c956cf885350884a50f349cde326505d323c5beb8c850d12d14571c47f
-
Filesize
6KB
MD59d998ffa515263d01b6944b6701a0f1c
SHA149aa4aa7bca94a5a18dce07ef765226cabbc8287
SHA256b52e9e37652a22d229de5a4bff617529592db40b017d11e3506a816706b593d3
SHA5121b6694c112b0727dab5c9cf796d3a77147f7ea653ddbae3e8a94bd8300f40083965a5e86bf8e8c88878f6847d65ccadaa8aa86ef4ccb238dc277122d8da063f9
-
Filesize
19KB
MD5ede73a0d28c3559d3844c1777620a135
SHA178303c5b4dbe92fc010364586457799d41c0c4d2
SHA256a88b07d786894721af94072ed800f3f314cf933923cf0e925cbcafa03f277d0f
SHA51203e11ae25814231554f0eeaa8aec139fb523e173c4f303eac3f719e01156b4a552ee7960ee094c1b5662c1a683e59d3602435539d1c7ca154021f346b8d15216
-
Filesize
9B
MD5de17acda655390ba899ee585d1e17781
SHA17509ea5033f32eef5ca438999251ce2ac9f9a248
SHA256154c1bfde3daeb5eef2d5abe88e31c9593e06cdb7c8b54ecb3bdf17644b4d3ed
SHA5124ffc43c0a5e4adf4206390152b5ba28b227f74e55863bb7dbc24782ca5ac9f601a01a28b8222214918faa82f697af267148b6736b5fd11a97c21478b5cc6c423
-
Filesize
43KB
MD5ff8dc8e6663b04ac4d9a93314cb3ed4d
SHA1f8416282931ec436b9590c26cfbbcb290c6814e0
SHA2568a2fc161c7db8ff5e15364b6d9fff7518e4ce7d847e15dc27e9844a25c23799d
SHA512829bcced772fe5d3e8373fce0092e4f3ae500c0ff8378fa57b6a2e3ab16ced5ddea0a526205f1158d98a873182ced1f75139d5c8fd2d28d3449784396146bd35
-
Filesize
3KB
MD5602589fba4cacf7dfb5674be48813030
SHA16e2ab7502e9a02138ddccf8e4956788f279cbbc8
SHA256c8186b55127433288b63cb0731fb8072a59c001c9d90e19ef4e53d6e83e6db52
SHA512233779e512c973b3bf9809c58c38f5026bc2416b822222287d3aaafb8d6afeb11db28cdd9a7b80a57301f9d96a3dadc2f327bf295ca611e50c642844cc5aeccb
-
Filesize
1KB
MD5ea09ed3a3862297e0e2f6e5b4fb66c8d
SHA1b1aca654ef49014bff0790aa6c967829de3fc545
SHA25656107f9045a24e41e03bcee9cb4680a1572bccb1b11e2b6c1232b0bc57090952
SHA512bc88f776e16976c3c1520d2d9927a399f5bd0d6e9e90ec9c4838e9b72bfd17036778088d2411dcf371e26ace8b473f395e1e2c6993eb6af1da483d742a618c78
-
Filesize
6KB
MD5de222415970b34def59e9d4c6cc29910
SHA17e6943a2b1e430a386b7529c6052e5c2b2b661b1
SHA256f0091f688fa7fb37e43d6db93ee023b944db53756c8836f2bf4ea34f1ad08810
SHA512ddc2efcc3b79ddb4ef577b0015185b03d445eeece6fcebe2cb3e4d55b7d01c83fc38d54e1afb5cd0e3d4a48db988fb6541dfc13900c97ea590dc912c80d042b8
-
Filesize
1KB
MD57e1eb2843836b6772806f37704b29ffa
SHA171e3f1fd5cdda2060e10374691030644e706ecd4
SHA2565786268ba86692b853508b656d36a55d9cbbac29dd81ccc9d59a01cac11806e4
SHA512e62dbfec5d522c64b16f21177d30f5abb2ea6666a846ea4bc5cc312afc85f60577a1a0d9da238e8ea653508d982dc903b87830a810e706f3ab32bf5f0be6cd57
-
Filesize
3KB
MD5e9e6e138b66d5d846235f2a7674a84bb
SHA1e2f0cd85d2861c4e93c7e67c1ffad1f42f2cce98
SHA256c3e717e872176ccd720bfa89785496cfcdfe284d37162b24e304b420368b76ab
SHA5124f0109c9624bf80e8a29c37d526221e70a5468e526da40fb0b23a7c1290f1468c09edc5464e343357a48d8c8f88fa91ae08ee479da8e55057e045c67019c921a
-
Filesize
2KB
MD52c8008d1098ab6e6d0bc87c79dc9a9dd
SHA1bc450b631633bfbc8377da92fd866b510a5af4ab
SHA256cde438a03b54539152a257acd1cd730ba13886d41ad9548bd7fc0ec75dcb690f
SHA5126667491ed941c2acda3a6a09082904609f8518f16c4d1944b9bcf525d3a65a75e66ae48c605f83c552052333431999cfc640c8fba2e5f9bc2c249ff4a40d21a0
-
Filesize
110KB
MD524b61e9d0528539382fab57dcdcd48e8
SHA146c78fc845e8f67dd14d7cc7a9f3696c3a673c32
SHA2560502f5cb145f18f78606512e9dece58588ff4dfa634e85cf742a3b0ebf061cfa
SHA512f6416968e6e2004e0e0610415d4d608db12f985714084566562a523cfad4aafe88028f40f3604df0d1d8d20db973c121966fb5d198a2074b5feb1e973f6d24d9
-
Filesize
758KB
MD5a643f666ad6ca8fb8acda955372ea0d7
SHA190b692b85ce869cf9ec0f645071e5902e4ce68aa
SHA256fb5ea5550f83536307388c2e49270c64172507331c913c53f80620f0e1f825bc
SHA5127bfa9566fe00da4c0bf442942b99ea42bf912920beba73b8f40d25377945f9441f221b031f7d120e232376ef5f9783b3c2ae5475e0839b15723f150dba00f414
-
Filesize
2KB
MD5bbd256c20add94c6c4354e1feb4be190
SHA102b7649614826c6f5bfa0ab1e60391b8e0fc6de8
SHA2569f6091199e7bad73de1870f522f0e139f8576563cdf91596426cbf0190a0441d
SHA5129fd7293f74807a5232f5d54412e4edbb1893424f697fb659969e6b20c585ced0e2aa4cb48032d6f86606a1f91207ba65d0b1aac60b776c307489c1afeaf7ae70
-
Filesize
1KB
MD584055b28877e5a5cb738f390631e1218
SHA1bf6ccc05e171a666df6bc3483cbd45d756e56c4e
SHA2563a59238e631157ce4f4878dce34706335ec2b6d1890e67e32b0d5213c79e0e01
SHA51240a305401fbd51bb3f6305ba5701d947544d31789b9e2d796420e9e7514322310fc538bf6a35cbfcf0f7704b40c729288336139e14ea2463e65cf6822bd91507
-
Filesize
277KB
MD5cea772856e01d32951b65e687374414f
SHA1bba23601b9ef3c700ba4ac85473053be1474e697
SHA256cfe80c274b4f8be58326bf6856bbd19a3c747a182971ae57c89ce58947c38041
SHA5122f5b0372af26b21111eb833cfb82d6f1f55769353894b24beabbc995f09b14d33e61ae86608ffc96474d87c0712ba0438ae3bbd7c6ae14361b3a7588873f48a5
-
Filesize
763KB
MD50ee248cc9fbcd08f2ef28928b4b7021b
SHA1b3db2f4fa69d8b4738e2ad0de831af89aedc287d
SHA256557ca2f1e69aef042a766d587b884853830bc959699ccddd1531d45b9863d3d9
SHA512ddea9c3dccbf430b5cbc8a343821bc14d7efd857e429898d3d1c2b3bdc9bf8ee9e1d8a415a329ff7f5e1cd03a30dc0b09729e9a94966589ea8066ca69ba28fea
-
Filesize
629KB
MD5938f473b36c009cce3358293842566d4
SHA12b1707d40f4735717f31d436702a421957d34fe2
SHA25637af8d25fb7cfa3f408ae50ef90b073923876adf36a3c87a6c7f9ec97acf2a5a
SHA512af1508d0c5e5e1d2e84b8defc3a6124c5f08d9867b3e5fec20b6024eca4e59cb889cbd79948edc51bb1a4b88f9ba6785672f0bdf4280b72be450e1cbe7db44ca
-
Filesize
1.1MB
MD57ba30fa7142d0a262097b129ccbe73f3
SHA10b4a25f0b1f839c0cc366433ba40c57b2e7d141e
SHA256b42dec8d0bddca933759facd0ba0f2e69c1f194108ed32ef90ac3ca56c4f27d9
SHA5122452220416ae6e6a40b5c0ece29bed0f7dbb0eb29acb46ac7f6ec90121dcea2b465bc99bbb227092f397c7e39443c2739a6671aaf9ec1e324c99f25b7988eba2
-
Filesize
53KB
MD56417f6075b07d9b28a4fa8fe5f100da8
SHA1b65039d7567aac78c7eccdb93cd23e243e56467c
SHA25635dfb3c63f71402cfadf852656f510d74f03d888e92cfa762e9d05e3029c667f
SHA5120e2375051d5c2ce02921b55e612e416976bfb442bd7b3056efdff5ac7c457e29be93b45c8be59797a86caf447d0f3ef170be3cee7818dfa80901efb71dbb0d53
-
Filesize
25.2MB
MD53b4d57b21bb78c31d314aa15dbccd507
SHA1c5e9b2f1ab4465d078741fca18a0397772109e3b
SHA256f8091bf9f970c2cc7d8fc2909138ad927190f34d8af204186861cadbe4e0d3cd
SHA512714d6af53dc01c975c74ad977bbbc767be86b346e789a4bf10b224eb617bebf8490f0ddc0c3f743aaf4cea06c0e16d498843818914105ff5a2b6d938616b5240
-
Filesize
756KB
MD566330fdef939b48a5e3c1c3dd8f1244a
SHA1ae0b97985beab0b3ef563d7633ffb417590cee30
SHA256013f4af3c5a96333cc4ef6fe1252370fbd43fb9bb72896b64f6b4d6d37235b3b
SHA512351a76bbd39850015974025cc8dc4e0e87966a1f0da994029cc40eb111003f0bc84da7d863069d966832786581e8f32c70a45f540cd9ecf2c94db05ad9576f8d
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
308B
MD52d3ac1b8858970424ce0324c0b37abfc
SHA13216a9558216d754834ea304615d1b14e47b94e1
SHA256b6753940a4b22a1064a64c05bf4f64979eb1458e500236c5a76a8c0f65d1e36d
SHA5124d0469f4a2c87726f6d0760af2e4a28f728fa2894483eae3525dfa79d2543fa7368b5c80e6f8e79ef794e811ed0f16e9b575333c56e0719711024c66650ce7e9