Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
FullSetup.exe
Resource
win10v2004-20240802-en
General
-
Target
FullSetup.exe
-
Size
810KB
-
MD5
44e6f5db4a0f2c8f90c487b06c1b31bf
-
SHA1
8dbdb692668f214892759c2e0ce2ee1e16aed475
-
SHA256
447cc0e824ccbad20d29998b9e64b792d7c40de93ebc36ac490748f4b551e02c
-
SHA512
c0201dc9ed1354103b72670939f5e2226f1559748618e2642dbf3e6b7f29189583e641edb70c135976d7d58a39edcd12871d6b588e1eb500151125c5cf8d6f11
-
SSDEEP
12288:ZiuvcvdBR6qqAqo8BjSJpbYNm1Bi/k52jCVkonaafLSPbXCvPFqwnNZ:Zkv6qqdpSzbYNOBV2jMnaU00tTNZ
Malware Config
Extracted
raccoon
167f93a63fe65b2f9a51452da5a0e659
http://92.38.240.8/
-
user_agent
mozzzzzzzzzzz
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2360 Gli.exe.pif 1444 Gli.exe.pif -
Loads dropped DLL 6 IoCs
pid Process 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" FullSetup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 1444 2360 Gli.exe.pif 97 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gli.exe.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FullSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gli.exe.pif -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1888 cmd.exe 4296 PING.EXE 1284 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4296 PING.EXE 1284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2360 Gli.exe.pif 2360 Gli.exe.pif 2360 Gli.exe.pif -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2948 5060 FullSetup.exe 82 PID 5060 wrote to memory of 2948 5060 FullSetup.exe 82 PID 5060 wrote to memory of 2948 5060 FullSetup.exe 82 PID 5060 wrote to memory of 1888 5060 FullSetup.exe 83 PID 5060 wrote to memory of 1888 5060 FullSetup.exe 83 PID 5060 wrote to memory of 1888 5060 FullSetup.exe 83 PID 1888 wrote to memory of 632 1888 cmd.exe 85 PID 1888 wrote to memory of 632 1888 cmd.exe 85 PID 1888 wrote to memory of 632 1888 cmd.exe 85 PID 632 wrote to memory of 4404 632 cmd.exe 86 PID 632 wrote to memory of 4404 632 cmd.exe 86 PID 632 wrote to memory of 4404 632 cmd.exe 86 PID 632 wrote to memory of 2360 632 cmd.exe 87 PID 632 wrote to memory of 2360 632 cmd.exe 87 PID 632 wrote to memory of 2360 632 cmd.exe 87 PID 632 wrote to memory of 4296 632 cmd.exe 88 PID 632 wrote to memory of 4296 632 cmd.exe 88 PID 632 wrote to memory of 4296 632 cmd.exe 88 PID 1888 wrote to memory of 1284 1888 cmd.exe 89 PID 1888 wrote to memory of 1284 1888 cmd.exe 89 PID 1888 wrote to memory of 1284 1888 cmd.exe 89 PID 2360 wrote to memory of 1444 2360 Gli.exe.pif 97 PID 2360 wrote to memory of 1444 2360 Gli.exe.pif 97 PID 2360 wrote to memory of 1444 2360 Gli.exe.pif 97 PID 2360 wrote to memory of 1444 2360 Gli.exe.pif 97 PID 2360 wrote to memory of 1444 2360 Gli.exe.pif 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\FullSetup.exe"C:\Users\Admin\AppData\Local\Temp\FullSetup.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeWerFault.exe //////2⤵PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Moto.eps & ping -n 5 localhost2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^tfRFLqTvsdIvUOKycksieezLBpgscdNdnOfYhOdVSSkJZtltWZlydmGwVytBLBqqCsYunLRHVcglRKMvZlxvuHZYiheoKPldRluIutFkiClUkvplaHCBiEUVsqYkJJX$" Tua.eps4⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gli.exe.pifGli.exe.pif W4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gli.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gli.exe.pif5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4296
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1284
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
804KB
MD50b1008510d8ad78f303d4002b429b8db
SHA19abf5a170d7200bec2af12949fa88be6e64f4c7a
SHA2562b394bca6c02157946a8344d478c1e6e4295f6714dbe531360f7033748c2deb1
SHA512de2662e6c7edd9856bee6c90760708a6cf508bb289f0765a7bf0847b9ab7ab99bce9cfbd67725dff2e98ef76a425552ece5440e3492c1bcf8cfd5fd0a80005f2
-
Filesize
8KB
MD5258280b6e48ab449d2190299900d195b
SHA1d991053bdb2c36526fa5ac70c11d5cd125a63f2f
SHA256c033bde6cd385138ecc9c1726cb91aeb4c33eb3b107baf81fcaafcd24bb16d92
SHA5122d35d334073dd64bf08b806908d34314d17cd66e8289fe0a0ec0462070b265cc74d8f801c3dc08a7e38c08d695b52aabc5d8c5714d72519c82b607c6bdddcfff
-
Filesize
924KB
MD52680f631d04f3e8f3422f5c4681d044c
SHA18429c33dfc52763a7c192f8134436c7ebb314cf2
SHA2564f3210a0dadf4bd1da643251e3ee89718c4fc90078ef6917871740b39bfcf137
SHA512a4e60d12c1edb136a60d4f2e85518453025eb8f310eb2d94a1906b2a1165bf0a28995a64e6b943809ad6be69a6b85c3e3ac066f25012b1e705540414c6dabbc0
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219