Analysis
-
max time kernel
39s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔/「SetUp・H€RE」✔.rar
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔/「SetUp・H€RE」✔.rar
Resource
win10v2004-20240802-en
General
-
Target
✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar
-
Size
9.4MB
-
MD5
18525c80b3fdc710112ddc1e3a15c59d
-
SHA1
1eee848f44f0513df3be61ec46cc66870dbc2d4a
-
SHA256
c6d67292c6034b1668a5c8f334d9bbeeb40a534983b7a5a47d0973de89e3decc
-
SHA512
b9b862c65380ec1987ce3aced97d0a1c37896bb92347ad561fcb535a7320ea08e15c2dc1660400d63b146856f1b30b678d3b95fca23440415120b544ab0b7897
-
SSDEEP
196608:CutB6AoHs42rMqKlr+LgbrrdNKsauXOhMtzQjxtRNyugRiO74e:7tB0R2r9KysrZJehkkzryTgkL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3012 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2944 rundll32.exe 3012 vlc.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 3012 vlc.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3012 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2944 2672 cmd.exe 31 PID 2672 wrote to memory of 2944 2672 cmd.exe 31 PID 2672 wrote to memory of 2944 2672 cmd.exe 31 PID 2944 wrote to memory of 1724 2944 rundll32.exe 32 PID 2944 wrote to memory of 1724 2944 rundll32.exe 32 PID 2944 wrote to memory of 1724 2944 rundll32.exe 32 PID 1724 wrote to memory of 3012 1724 rundll32.exe 34 PID 1724 wrote to memory of 3012 1724 rundll32.exe 34 PID 1724 wrote to memory of 3012 1724 rundll32.exe 34 PID 1984 wrote to memory of 1032 1984 chrome.exe 38 PID 1984 wrote to memory of 1032 1984 chrome.exe 38 PID 1984 wrote to memory of 1032 1984 chrome.exe 38 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3040 1984 chrome.exe 40 PID 1984 wrote to memory of 3032 1984 chrome.exe 41 PID 1984 wrote to memory of 3032 1984 chrome.exe 41 PID 1984 wrote to memory of 3032 1984 chrome.exe 41 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42 PID 1984 wrote to memory of 816 1984 chrome.exe 42
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\✵s͜͡etUp_Use_2945_P͜@s$C0DE✵✔.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6629758,0x7fef6629768,0x7fef66297782⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:22⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1384 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1520 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1364 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1492 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2860 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3868 --field-trial-handle=1100,i,9182838272422509912,796923306970329272,131072 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5783b1b76b4cb7ed8d833ab839514dc0f
SHA15b14bc3f9798abf68f06b92ebfbd3059ecdb2c44
SHA2564935055ec4f092bf18d8d3a733f72015ce0cd9548c0911a4c69b6936d3c44963
SHA5123c4150283b4c65578eb67efd7beb9210cd5a47222432affef416edb35f65d961efcfadfa00e83df0902acfe342b61d47e3dc6aa55168f26e4c9c09db7c8386ce
-
Filesize
5KB
MD500dab4f724cdbc34b2888f28ff504cff
SHA1f9fe25b01b3770c2dda557f1143228ee1b975e9b
SHA256f9abde3463eed30fbb52c85980fff3eacbb1799d479be038298104d103b26418
SHA512c4d30d011b8201bbfc094fcc33b9ae175c9e49910a0bfd53b295c0b3dcf97e12ec80b0174ff2641d29a35a51c33e6c7953df602b6bc11fe2caa0196a06de2b6e
-
Filesize
5KB
MD5d2a0206ec21a80d066160e55d371cb06
SHA1e7f6b0f574fabf4a15aca417ffecc184d38f704c
SHA25629c30d357d245cc49bef6066b212d949030147be456b91a7af2cc8cbd8891bef
SHA5128a225ca2da69dbac1d94a57ea274531f4ac85b6ce97f0bbbd347378eaebcf6fd06c1f8d896822fb8abe216777ed14ca10cfbc3901ad216bcca631930d8f86018
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2