Analysis
-
max time kernel
142s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
Set-up.exe
Resource
win7-20240708-en
General
-
Target
Set-up.exe
-
Size
6.3MB
-
MD5
9c6348961ddfb93988d54adff5e45bfa
-
SHA1
7fd1bbdb3f4e024d74b38088d99c5f3bee8f28f5
-
SHA256
7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434
-
SHA512
2cb4b575738c33865bd656225c560ec837f832d8bf8e9927fc5e154b2ad6f65a1ee53b275fb10894ea9bcf813cc5e6d99f8aa8ba2bd4b3d7ebbd4e44620cd02d
-
SSDEEP
49152:iQhbGEGVCjdEbS7IhzjyHP+M8zArBpP+puwK8kkIYjrSXmF+kTV7XU0Bt8su/hY9:2bSGSHH8zzEV8kk5S2FpVtBM/hYCx1E3
Malware Config
Extracted
cryptbot
twelvevf12vt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2860 service123.exe 2060 service123.exe 2500 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 2368 Set-up.exe 2368 Set-up.exe 2860 service123.exe 2060 service123.exe 2500 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Set-up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Set-up.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2860 2368 Set-up.exe 29 PID 2368 wrote to memory of 2860 2368 Set-up.exe 29 PID 2368 wrote to memory of 2860 2368 Set-up.exe 29 PID 2368 wrote to memory of 2860 2368 Set-up.exe 29 PID 2368 wrote to memory of 2616 2368 Set-up.exe 30 PID 2368 wrote to memory of 2616 2368 Set-up.exe 30 PID 2368 wrote to memory of 2616 2368 Set-up.exe 30 PID 2368 wrote to memory of 2616 2368 Set-up.exe 30 PID 2660 wrote to memory of 2060 2660 taskeng.exe 33 PID 2660 wrote to memory of 2060 2660 taskeng.exe 33 PID 2660 wrote to memory of 2060 2660 taskeng.exe 33 PID 2660 wrote to memory of 2060 2660 taskeng.exe 33 PID 2660 wrote to memory of 2500 2660 taskeng.exe 34 PID 2660 wrote to memory of 2500 2660 taskeng.exe 34 PID 2660 wrote to memory of 2500 2660 taskeng.exe 34 PID 2660 wrote to memory of 2500 2660 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C69F5E4C-73DF-4F37-AECF-CA97E6DF3915} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500
-