Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
General
-
Target
setup.exe
-
Size
3.5MB
-
MD5
e4be66e43059b7b402ae9e66888d3714
-
SHA1
8d4a00c8ffaf5165ee4d09c3ba96396b8c510ffb
-
SHA256
e7ab700d247760df44b1e3e7f13b6244756ffd3dbbde6d34521e9bd2539ab459
-
SHA512
2c4e8627d28ef4e3546876ba465545ee79a00524d2c995d6a51e95d4f828246f5b60bac65d3a91af9e91c920f09ae6c6ad2d2b5697ba95a8afdf8dbec4a09f4c
-
SSDEEP
49152:7+8UXJYLASeepy/UVRDUVKg6BcCV9I/rQbCpEMAcEHD6/4MYt0+kvaRDW7g0G:7++Lpe0V9UKB/LI/uCpTAcEM4ntymd0G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 is-BLE5S.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-BLE5S.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1772 3280 setup.exe 82 PID 3280 wrote to memory of 1772 3280 setup.exe 82 PID 3280 wrote to memory of 1772 3280 setup.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\is-I6G7M.tmp\is-BLE5S.tmp"C:\Users\Admin\AppData\Local\Temp\is-I6G7M.tmp\is-BLE5S.tmp" /SL4 $9024A C:\Users\Admin\AppData\Local\Temp\setup.exe 3416535 506882⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5e84de69f85741b96c7755124d725f754
SHA166b144676366e003477f71862ce1cb5b7213ac41
SHA256f8a9acfc4dbbc58dead29730e266726d1650437b76a73f6d2ff1a91949ca395f
SHA51239bee4921f2391354c30674473c32a388037ded833c368e4114d090c1496b403a3333ca937d5a6d73527efcfe4d2c71037e355929e597598471aeb6a597e6494