Analysis
-
max time kernel
91s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
startup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
startup.exe
Resource
win10v2004-20240802-en
General
-
Target
startup.exe
-
Size
2.6MB
-
MD5
ecafde6855179b29d166bc3396f4fc12
-
SHA1
5a882dde362d7690fb6a3533cefa03663abd09f2
-
SHA256
3845ebbb8a0af759606ccf0533166fccdab3b842274cabcb292719da9cb5694a
-
SHA512
8110e43384d7c09a59499cd153eb4311ee96d941f793d7c7f853a94b50d5efba5fe87c94150c1d68f8d80d25657e1d33e47a6644d932de8b3da661024809e7e0
-
SSDEEP
49152:S47Nlau3ZvJvDr4sGszFPpxoJswX8aVGx0Cng4BKNJ8Srga6pxX:SeNlau39JNGyzxEsk5ozJSrn63
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1640 startup.exe 5004 startup.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\RtfConverterFlags startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\XMLHTTP startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\DOMStorage startup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Anchor Underline startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Move System Caret startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\JScriptProfileCacheEventDelay startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\CSS_Compat startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Print_Background startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Viewport startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\MenuExt startup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\KasperskyLab\IEOverride\Main startup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab startup.exe Key queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab startup.exe Key queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Disable Script Debugger startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Anchor Underline startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Move System Caret startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Q300829 startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Use_DlgBox_Colors startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Play_Animations startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\XMLHTTP startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Enable AutoImageResize startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Settings startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\MenuExt startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\DisableScriptDebuggerIE startup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\KasperskyLab\IEOverride\Main startup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Enable Browser Extensions = "no" startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Disable Diagnostics Mode startup.exe Key queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\XDomainRequest startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Expand Alt Text startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\DOMStorage startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\AdvancedOptions\DISAMBIGUATION startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Cleanup HTCs startup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride startup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\UseSWRender = "1" startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Cleanup HTCs startup.exe Key queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main startup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\UseSWRender = "1" startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\KasperskyLab\IEOverride startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Enable AutoImageResize startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Viewport startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\UseHR startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Settings startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Text Scaling startup.exe Key queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Styles startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Use_DlgBox_Colors startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Show image placeholders startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\International\Scripts startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\KasperskyLab\IEOverride startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\SmoothScroll startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\UseHR startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\XDomainRequest startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\SmoothScroll startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Play_Background_Sounds startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Show image placeholders startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\International startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\International\Scripts\4 startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Main\Display Inline Videos startup.exe Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\KasperskyLab\IEOverride\Larger Hit Test startup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA startup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 startup.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN startup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startup.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 1640 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe 5004 startup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 5004 1640 startup.exe 90 PID 1640 wrote to memory of 5004 1640 startup.exe 90 PID 1640 wrote to memory of 5004 1640 startup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\startup.exe"C:\Users\Admin\AppData\Local\Temp\startup.exe"1⤵
- Loads dropped DLL
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\startup.exeC:\Users\Admin\AppData\Local\Temp\startup.exe -sendDump="C:\Users\Admin\AppData\Local\Temp/KAVINST.21.3.10.391_09.15_00.24_1640.SETUP.full.dmp"2⤵
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD56b439a6b87e6f6e30241cb64466087ef
SHA163799d31bde76653677d5dd647d98488136177c6
SHA2560a4406ae8ca4c397e63a686b5be680b7dec0d7006b9ab65dce22372955ed9644
SHA51270c1e61c30881ed22529ef25e61b3958185982a0b569f070a58b2614bb1ec2958cab5e47a46afaa86ef9d8140791dda59507fa5a5a34b0092b03726e77b88187
-
Filesize
1KB
MD551dc1945e2d325f9451a1b6898282bc2
SHA1bac3c11dc11dff02035080e6f67eb2298db989dc
SHA2561ad0e2ac0603724a2335dd6c2044465ebfdc5b5b350d370eb4e5e0a02959a0f5
SHA5122f48b53d10151414104fe68bae3647fc2d021dcb5562b212e185f93cc2cd0430f56d68fb2e9ac8a2356551c4f703f8da3228573d32b2ef80c698eac3b5fc9262
-
C:\Users\Admin\AppData\Local\Temp\EBCC6339-72F8-11EF-BFD9-DA2E3A28CA1B\install_error_send_logs_page.html
Filesize2KB
MD5cb59c7593555ec7511f0ce6049c95cfa
SHA109044dd6baf785ce6484b4a861b741990629db45
SHA2569da9c7cea5cc920c9bd110fd4e2ec0b02d91e7bebcc71a95f5efd3bac3d99468
SHA512835b945b061188d95e8cddf91ea06109da2caffb79abca742cfa5aa5b84a83e5f82b2a624f7067caf026f56cd997c0c9ab9d1ac09c016ebd5301ace36f080ae2
-
Filesize
94KB
MD5618538b4ab9639d444e962729a927f15
SHA1dacc1f76630a9708add066819b1aabf8dce01056
SHA25627d92130c0321dad5a03760fd5ac98a3d04ed4c94d88418fe6d50da1f7fc5cbe
SHA512bcb6754ea246939a19a917cc0b810e1753c1b0f1a8b1b7e652128ef15dee4fc79111e4d88fe12f9188449a307e82240d0261af402d783428edfe5785c860372d
-
Filesize
5KB
MD5d2c620c462b75696eea1fb22fb23602a
SHA1900f78eb8e1103be1535af5e76d1bed686cdcce3
SHA256dd678d32073078552e0e2c35eed78f16cc8d6e8662d4734518561a1b183f775c
SHA51240e1180b63b328c22cfacc40529cbda2409a54fbbbd5813fcc5f8dcdf95ad7fcd74ea96382e3a2d0bcfed9e68c208f7733b7c630edee7e2013c9a5459091c02c
-
Filesize
306B
MD5026425ccbf4417eefa444285707132ef
SHA1a953b9f6781d4b6daa2eedc0c45d358f2a472370
SHA25697e5f342227ea23c27c1b660f111847fcdd9d7b23c1d248c733a36f983fd7f04
SHA512a266e2f9f10620347f0d05d081362086e81c67fb7c5f4a74c26cca54686f6afb2f2933b1f7afb6d9c96382ff4e4e3cf2f0f38cdd162175cdefccb5909b1aa6c3