Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 05:21

General

  • Target

    Setup.exe

  • Size

    505KB

  • MD5

    5d8d0c08384ad73216d52a2eabc064f5

  • SHA1

    0fa5c77fd6b6323b926c9648679e063d1bbc8bcc

  • SHA256

    30522715240f4a05859099ac370dfb516097ab257402981c6a9ad31951f36cce

  • SHA512

    42a3003019e39622082506c7ae50d8a27e2920fdfdf15eb9a8dbf7f1dbd49a02cd0390dabd74c136ed44e9d8ba270540ce9390f31aa84c2fc9fdfcc9e912dd57

  • SSDEEP

    12288:6xPm2P17YJbq9VXMLVS+n78L6OdBRdrrf3xr5Uw1jcZQM7gMyZQU:6Jh17YYVV+YGsBH3xr5Uw1jcZQM71yZX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoC37F.tmp\ioSpecial.ini

    Filesize

    694B

    MD5

    bf342b09c5237f03f5f5bd787d34bd3b

    SHA1

    abe76c354ffc1e3f53495abb3794468bfb724548

    SHA256

    2b3bc8706ba9e2e0e720756ac36ac91fc41ec68f996e05b516706a0105953536

    SHA512

    0775cdb88024765a79c488aa45ab07f9f9f567bfadd0114b8d891145ac3e26368734faea79a9739da03f98fefd8f073b1b33091857856418073c9e99f0047897

  • \Users\Admin\AppData\Local\Temp\nsoC37F.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf