Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 12:05

General

  • Target

    setup_christv_online_premium_5_60.exe

  • Size

    5.6MB

  • MD5

    199b3fcf3e54d8bb33881b532b64c69a

  • SHA1

    f7297aadf0b996bfdd62a8ef4f9f39ebc04dac12

  • SHA256

    0202dd73b2bec6d9e788431271f8db1bdf8cfff645422dc4d82047d955bcc19c

  • SHA512

    f16a97876112956c3321858797feb0cf0dc4eb1f01b3926e018d7117dc13552634cf087a0ca80c37ae0c69135f4bdb5180195a994f8a7235a6c7960419b8af27

  • SSDEEP

    98304:77p22Th38RZLh3hIoyPvqlHzLkIh1BzSHVisYbzwNeiEy2Ql/uXCo4U8o0+sFYbg:Xp22N+l33yYHzdUVisYbUN3GCFU82sFm

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_christv_online_premium_5_60.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_christv_online_premium_5_60.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppi.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:444
      • C:\Users\Admin\AppData\Local\Temp\is-IS3FM.tmp\SETUP_~1.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-IS3FM.tmp\SETUP_~1.tmp" /SL5="$701E6,5395862,54272,C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2144

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

          Filesize

          5.4MB

          MD5

          c0a51d58ae636dd08d8ccee14d5746dc

          SHA1

          886974842922e2e8fabe020bad43f5672f61d193

          SHA256

          bb6b80c02254a2d9ebca5b34ba33e2a82f75381125830d9afaf20b78f3268589

          SHA512

          ef1695cfc151ed7fbcd28f67fe7ea841c18dad391f9fcbac38751901f1adbd65ce3996aede7b182e4867329be473a6574deb643eb9373f5598725b26ef80be34

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppi.exe

          Filesize

          158KB

          MD5

          69c343fbf34df0d280ce2514b3197904

          SHA1

          08f3666b88c63292e4bb7147348c30b993d99556

          SHA256

          9dce84cb358e678e298c95b899d67491114af6cdd21e55279162a5c87a6fa7bb

          SHA512

          921028d32cdfcd4d932306f38d4bac88e40585992ff9696692fea68784f08647f3211648695c8e8a3cb1c067c5368dc2d51270d4718aa9272d5637cde4ffcda8

        • C:\Users\Admin\AppData\Local\Temp\is-IS3FM.tmp\SETUP_~1.tmp

          Filesize

          695KB

          MD5

          620f32e56b46e90e8aee43febc59f6e3

          SHA1

          d5edd63dd1390a1420b85f746e12a66625ae9354

          SHA256

          bcc9d63213012bf25a37f48015e5f755d359f3b08d05d35319b03b4a72710730

          SHA512

          8a9d2a2eb3891265cec379978399ad6c9b4bf3e12e0f381946b4390621b943b97fa04fbb87ad628652bd765b706eb2ff56001f24de24e9bcc487a59ca2f07d9c

        • memory/444-38-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/444-22-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/444-20-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1380-6-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/1380-16-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2144-27-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2144-41-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/4720-13-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4720-37-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4720-10-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB