Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 08:35

General

  • Target

    Setup.exe

  • Size

    4.9MB

  • MD5

    90bb5ad570c2db9c40284c6a023b5a3b

  • SHA1

    3129d334964d24bc5f2cc10318388fd4a6ab3e4c

  • SHA256

    614aef17e1d6035238170e316998a518d0939bbb78a12eb2fb3a33f07ca80f04

  • SHA512

    c998a2c7558359ba78fb6deed79e0475c08fe0bdb783b4a84562cb79e37d880651318c2c177f6f57c9f68f37d083a87d1f510812278c73fc05b427b116340470

  • SSDEEP

    98304:n0XJEzdlxgwR8eAEC4qysc19AXUvggyDGneUnNqSdtYsg5wWZqr1EQXmu/:n0ZGdoECXysc19ryDDuTfYs55Nmc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsj7A8E.tmp\ioSpecial.ini

    Filesize

    720B

    MD5

    8fa07c749f1f4d164b6077eaa52ef10b

    SHA1

    34dffa285edace7a43414fd410e960d698684196

    SHA256

    753f0374050984edf2cdf7644cb17d11cb843c18551f118efadb4dd9a3a1ee1c

    SHA512

    10663932a10bc11b06902ac66ed4ba2f7bd44da8a3f362cb2c392e8072771ddce0d91d15d0ed6ca624cdc81d5a46a45d5ffd9f54d8c644ae58691581b0a46d9f

  • \Users\Admin\AppData\Local\Temp\nsj7A8E.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf