Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240704-en
General
-
Target
setup.exe
-
Size
6.3MB
-
MD5
d2ae1abde26f7debad39e95d83b23f2d
-
SHA1
b7ba512ac811048377a837555905db1d31f01b7f
-
SHA256
ff5fd7ba4cdd0a39e7a53346af5fdc790c47051d017e80b635c5b4ee82d5f1bd
-
SHA512
4b544facc22f91255aac31203a92b91aa802a91733bfac4757597d7c95a4fec7a612a7ef232f283e5f5bd73b8c402c9947b814e09dc7af58f03742b6ea31f4cc
-
SSDEEP
49152:m5t/+rS5A0o32tb1RRYjva02VRZUYNLA70wUiiGPqYUAlVC033AJXF44F6y14Kg4:MXRSTaJlRNLa0fiTPqXvsTo3GhpOX
Malware Config
Extracted
cryptbot
analforeverlovyu.top
twelvevd12vs.top
-
url_path
/v1/upload.php
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString setup.exe