Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 21:17

General

  • Target

    b4asetup.exe

  • Size

    7.4MB

  • MD5

    dd79ef12603e3e4ba8d32ec754802784

  • SHA1

    c4c1c4b73ed32237401e93a8c496296c624fa722

  • SHA256

    615544ec1d5e7b20989398f8ddd0d9f68085ec13d9a006698c665575ac307216

  • SHA512

    ca380d68d5e77b78181a79232db7b6f2d88a94058a4d42d892fb463a601ef55a8cacea390844b455508f743e133b5cde07d155c1a998fb6ab6f23be8d0b98f40

  • SSDEEP

    196608:TMBQ8nhblY8pzCUe1T7lJPeMwp8O5HCBtdW9MkOujwDd5cX+:cjYe+XPeMwp8OI1W9MkH6++

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4asetup.exe
    "C:\Users\Admin\AppData\Local\Temp\b4asetup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\system32\pcaui.exe
      "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {00e60f9e-fa5a-4787-807c-aacc0d142a94} -a "Backup4all" -v "Softland" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\b4asetup.exe"
      2⤵
        PID:980
      • C:\Users\Admin\AppData\Local\Temp\is-5SM0D.tmp\is-61LCU.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5SM0D.tmp\is-61LCU.tmp" /SL4 $60258 "C:\Users\Admin\AppData\Local\Temp\b4asetup.exe" 7454727 77824
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:5036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-5SM0D.tmp\is-61LCU.tmp

      Filesize

      673KB

      MD5

      752ef985185a3dd3f3f7e8682be9aa57

      SHA1

      9503f8e217582ec6b472f8c5cfc89d8de02d4685

      SHA256

      55112b8c6dcc15e3bd9a1a6594e4fab83c26f9fd0f39927fd9d075ab32470179

      SHA512

      5a4345149a05b303398eb2e3383989894803539ba626d6f4e4e28574be0a7e667136437828df170f675eb5892c9ee20c4048b76ba5c8c9ff97c553d82f477e1f

    • C:\Users\Admin\AppData\Local\Temp\is-HNMBD.tmp\_isetup\_isdecmp.dll

      Filesize

      13KB

      MD5

      a813d18268affd4763dde940246dc7e5

      SHA1

      c7366e1fd925c17cc6068001bd38eaef5b42852f

      SHA256

      e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

      SHA512

      b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

    • memory/736-19-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/736-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/736-2-0x0000000000401000-0x000000000040A000-memory.dmp

      Filesize

      36KB

    • memory/5036-28-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-32-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-22-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-24-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-26-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-7-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-30-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-20-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-34-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-36-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-38-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-40-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-42-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-44-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/5036-46-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB