Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 15:45

General

  • Target

    setup.exe

  • Size

    3.5MB

  • MD5

    e4be66e43059b7b402ae9e66888d3714

  • SHA1

    8d4a00c8ffaf5165ee4d09c3ba96396b8c510ffb

  • SHA256

    e7ab700d247760df44b1e3e7f13b6244756ffd3dbbde6d34521e9bd2539ab459

  • SHA512

    2c4e8627d28ef4e3546876ba465545ee79a00524d2c995d6a51e95d4f828246f5b60bac65d3a91af9e91c920f09ae6c6ad2d2b5697ba95a8afdf8dbec4a09f4c

  • SSDEEP

    49152:7+8UXJYLASeepy/UVRDUVKg6BcCV9I/rQbCpEMAcEHD6/4MYt0+kvaRDW7g0G:7++Lpe0V9UKB/LI/uCpTAcEM4ntymd0G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\is-I6G7M.tmp\is-BLE5S.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-I6G7M.tmp\is-BLE5S.tmp" /SL4 $9024A C:\Users\Admin\AppData\Local\Temp\setup.exe 3416535 50688
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-I6G7M.tmp\is-BLE5S.tmp

    Filesize

    577KB

    MD5

    e84de69f85741b96c7755124d725f754

    SHA1

    66b144676366e003477f71862ce1cb5b7213ac41

    SHA256

    f8a9acfc4dbbc58dead29730e266726d1650437b76a73f6d2ff1a91949ca395f

    SHA512

    39bee4921f2391354c30674473c32a388037ded833c368e4114d090c1496b403a3333ca937d5a6d73527efcfe4d2c71037e355929e597598471aeb6a597e6494

  • memory/1772-8-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/1772-12-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/3280-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3280-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/3280-11-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB