Analysis
-
max time kernel
83s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe
Resource
win10v2004-20240802-en
General
-
Target
Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe
-
Size
6.9MB
-
MD5
d868b655d271ae44026642ce12db070e
-
SHA1
21e53641d81f6d73bbba18678073388c45af32d1
-
SHA256
0d8bfba24c94912b675bb2b0c82255908dde5d327462c86a69cd257a4f233f25
-
SHA512
33a28189f18793da4da41d9b2cc322f6575892541d1820bc6c6c5e1bd737de3e475371f6f224f21cb4c2b70999dafcefd36b6b55d301a9fcf2af4dc18797ddef
-
SSDEEP
196608:OvfXF+3LN1k9IJJCJ4ANDgEkpsBmD6bTZ9RraOMPHe:O3ALGIJU/gEqs86DMe
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 5 IoCs
pid Process 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 2832 pinnacle-windows-amd64.exe 2448 pinnacle-windows-amd64.exe 1164 pinnacle-windows-amd64.exe 2808 pinnacle-windows-amd64.exe -
Loads dropped DLL 12 IoCs
pid Process 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2596 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2596 AUDIODG.EXE Token: 33 2596 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2596 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 2904 wrote to memory of 324 2904 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe 29 PID 324 wrote to memory of 2832 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 30 PID 324 wrote to memory of 2832 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 30 PID 324 wrote to memory of 2832 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 30 PID 324 wrote to memory of 2832 324 Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe"C:\Users\Admin\AppData\Local\Temp\Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\is-B4S28.tmp\Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp"C:\Users\Admin\AppData\Local\Temp\is-B4S28.tmp\Alpine_Client_Setup_1_8_2_x86_64_34967856f4.tmp" /SL5="$401B0,5792470,1371648,C:\Users\Admin\AppData\Local\Temp\Alpine_Client_Setup_1_8_2_x86_64_34967856f4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"3⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2880
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"1⤵
- Executes dropped EXE
PID:2448
-
C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"1⤵
- Executes dropped EXE
PID:1164
-
C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"C:\Users\Admin\AppData\Local\Programs\Alpine Client\pinnacle-windows-amd64.exe"1⤵
- Executes dropped EXE
PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD558242b67c1dca5aa44bd073c467fef52
SHA14007d7df8496c2ad478b926fdc68d45b469ce1d0
SHA256bbc5a9c4197f314800b4c0298dfc64b2ac7a88222855d9f70b332e7c22a034c8
SHA51230c6acb4d7f8ba2aba1a630f3cccd08dddfe88df2d7a32e5b644c39bd5b9450d2293053008b222ec18fdd83737f5012234727b89ee89fe4d562ee209163585c8
-
Filesize
3.7MB
MD5b70bb5d5c57a0f5f06a5f5986630a422
SHA1e0913caa03762e8d18da8df62996b45114a3477c
SHA256909192c54928190e346b206e6aec674b300aa753bc3f8978748249d179bde2e7
SHA5123f97fa9ebad579c21e70146738753843b7606bcf119fdb541de9c91e72ed58bc17d7bec8376e201cf7c1112137f7922723ea9b59b0aabc2da13229ce6aa6a597
-
Filesize
3.7MB
MD5795014b00406eb92780fd7ce644cf9ff
SHA1b0d8608879517ee26ca8244be1de20f473227f2e
SHA256cc8bc64d6783e2fdf64a95a7c8bac518fe57d7e96fa64ee99ba0579d251d105a
SHA512f298135ee28746cb218d1a474fd57258b2c5ab56fd114c267ab6c3ab25c6d6748d12ff55a5aaa283911b1ff838e7d11a9c6ccfd870263d213c5280fb4a3908c0
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547