Analysis

  • max time kernel
    91s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 00:24

General

  • Target

    startup.exe

  • Size

    2.6MB

  • MD5

    ecafde6855179b29d166bc3396f4fc12

  • SHA1

    5a882dde362d7690fb6a3533cefa03663abd09f2

  • SHA256

    3845ebbb8a0af759606ccf0533166fccdab3b842274cabcb292719da9cb5694a

  • SHA512

    8110e43384d7c09a59499cd153eb4311ee96d941f793d7c7f853a94b50d5efba5fe87c94150c1d68f8d80d25657e1d33e47a6644d932de8b3da661024809e7e0

  • SSDEEP

    49152:S47Nlau3ZvJvDr4sGszFPpxoJswX8aVGx0Cng4BKNJ8Srga6pxX:SeNlau39JNGyzxEsk5ozJSrn63

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\startup.exe
    "C:\Users\Admin\AppData\Local\Temp\startup.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\startup.exe
      C:\Users\Admin\AppData\Local\Temp\startup.exe -sendDump="C:\Users\Admin\AppData\Local\Temp/KAVINST.21.3.10.391_09.15_00.24_1640.SETUP.full.dmp"
      2⤵
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E2CB6F9E8F27FE11FB9DADE2A382ACB1\setup.dll

    Filesize

    5.1MB

    MD5

    6b439a6b87e6f6e30241cb64466087ef

    SHA1

    63799d31bde76653677d5dd647d98488136177c6

    SHA256

    0a4406ae8ca4c397e63a686b5be680b7dec0d7006b9ab65dce22372955ed9644

    SHA512

    70c1e61c30881ed22529ef25e61b3958185982a0b569f070a58b2614bb1ec2958cab5e47a46afaa86ef9d8140791dda59507fa5a5a34b0092b03726e77b88187

  • C:\Users\Admin\AppData\Local\Temp\E9F6BC2F-72F8-11EF-BFD9-DA2E3A28CA1B\check_new_version.html

    Filesize

    1KB

    MD5

    51dc1945e2d325f9451a1b6898282bc2

    SHA1

    bac3c11dc11dff02035080e6f67eb2298db989dc

    SHA256

    1ad0e2ac0603724a2335dd6c2044465ebfdc5b5b350d370eb4e5e0a02959a0f5

    SHA512

    2f48b53d10151414104fe68bae3647fc2d021dcb5562b212e185f93cc2cd0430f56d68fb2e9ac8a2356551c4f703f8da3228573d32b2ef80c698eac3b5fc9262

  • C:\Users\Admin\AppData\Local\Temp\EBCC6339-72F8-11EF-BFD9-DA2E3A28CA1B\install_error_send_logs_page.html

    Filesize

    2KB

    MD5

    cb59c7593555ec7511f0ce6049c95cfa

    SHA1

    09044dd6baf785ce6484b4a861b741990629db45

    SHA256

    9da9c7cea5cc920c9bd110fd4e2ec0b02d91e7bebcc71a95f5efd3bac3d99468

    SHA512

    835b945b061188d95e8cddf91ea06109da2caffb79abca742cfa5aa5b84a83e5f82b2a624f7067caf026f56cd997c0c9ab9d1ac09c016ebd5301ace36f080ae2

  • C:\Users\Admin\AppData\Local\Temp\EBCC6339-72F8-11EF-BFD9-DA2E3A28CA1B\jquery-1.12.4.min.js

    Filesize

    94KB

    MD5

    618538b4ab9639d444e962729a927f15

    SHA1

    dacc1f76630a9708add066819b1aabf8dce01056

    SHA256

    27d92130c0321dad5a03760fd5ac98a3d04ed4c94d88418fe6d50da1f7fc5cbe

    SHA512

    bcb6754ea246939a19a917cc0b810e1753c1b0f1a8b1b7e652128ef15dee4fc79111e4d88fe12f9188449a307e82240d0261af402d783428edfe5785c860372d

  • C:\Users\Admin\AppData\Local\Temp\EBCC6339-72F8-11EF-BFD9-DA2E3A28CA1B\jquery.custom_select.min.js

    Filesize

    5KB

    MD5

    d2c620c462b75696eea1fb22fb23602a

    SHA1

    900f78eb8e1103be1535af5e76d1bed686cdcce3

    SHA256

    dd678d32073078552e0e2c35eed78f16cc8d6e8662d4734518561a1b183f775c

    SHA512

    40e1180b63b328c22cfacc40529cbda2409a54fbbbd5813fcc5f8dcdf95ad7fcd74ea96382e3a2d0bcfed9e68c208f7733b7c630edee7e2013c9a5459091c02c

  • C:\Users\Admin\AppData\Local\Temp\EBCC6339-72F8-11EF-BFD9-DA2E3A28CA1B\kis-script.js

    Filesize

    306B

    MD5

    026425ccbf4417eefa444285707132ef

    SHA1

    a953b9f6781d4b6daa2eedc0c45d358f2a472370

    SHA256

    97e5f342227ea23c27c1b660f111847fcdd9d7b23c1d248c733a36f983fd7f04

    SHA512

    a266e2f9f10620347f0d05d081362086e81c67fb7c5f4a74c26cca54686f6afb2f2933b1f7afb6d9c96382ff4e4e3cf2f0f38cdd162175cdefccb5909b1aa6c3

  • memory/1640-0-0x0000000077E00000-0x0000000077E10000-memory.dmp

    Filesize

    64KB

  • memory/1640-2-0x0000000077E00000-0x0000000077E10000-memory.dmp

    Filesize

    64KB

  • memory/1640-1-0x0000000077E00000-0x0000000077E10000-memory.dmp

    Filesize

    64KB

  • memory/1640-3-0x0000000077CB2000-0x0000000077CB3000-memory.dmp

    Filesize

    4KB

  • memory/5004-39-0x0000000077E10000-0x0000000077E20000-memory.dmp

    Filesize

    64KB

  • memory/5004-38-0x0000000077E10000-0x0000000077E20000-memory.dmp

    Filesize

    64KB

  • memory/5004-40-0x0000000077E10000-0x0000000077E20000-memory.dmp

    Filesize

    64KB