Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
b4asetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4asetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
crack/B4AOTB.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
crack/B4AOTB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
crack/B4aCmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
crack/B4aCmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
crack/Backup4all.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
crack/Backup4all.exe
Resource
win10v2004-20240802-en
General
-
Target
b4asetup.exe
-
Size
7.4MB
-
MD5
dd79ef12603e3e4ba8d32ec754802784
-
SHA1
c4c1c4b73ed32237401e93a8c496296c624fa722
-
SHA256
615544ec1d5e7b20989398f8ddd0d9f68085ec13d9a006698c665575ac307216
-
SHA512
ca380d68d5e77b78181a79232db7b6f2d88a94058a4d42d892fb463a601ef55a8cacea390844b455508f743e133b5cde07d155c1a998fb6ab6f23be8d0b98f40
-
SSDEEP
196608:TMBQ8nhblY8pzCUe1T7lJPeMwp8O5HCBtdW9MkOujwDd5cX+:cjYe+XPeMwp8OI1W9MkH6++
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5036 is-61LCU.tmp -
Loads dropped DLL 2 IoCs
pid Process 5036 is-61LCU.tmp 5036 is-61LCU.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4asetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-61LCU.tmp -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 736 wrote to memory of 980 736 b4asetup.exe 83 PID 736 wrote to memory of 980 736 b4asetup.exe 83 PID 736 wrote to memory of 5036 736 b4asetup.exe 84 PID 736 wrote to memory of 5036 736 b4asetup.exe 84 PID 736 wrote to memory of 5036 736 b4asetup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4asetup.exe"C:\Users\Admin\AppData\Local\Temp\b4asetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {00e60f9e-fa5a-4787-807c-aacc0d142a94} -a "Backup4all" -v "Softland" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\b4asetup.exe"2⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\is-5SM0D.tmp\is-61LCU.tmp"C:\Users\Admin\AppData\Local\Temp\is-5SM0D.tmp\is-61LCU.tmp" /SL4 $60258 "C:\Users\Admin\AppData\Local\Temp\b4asetup.exe" 7454727 778242⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
673KB
MD5752ef985185a3dd3f3f7e8682be9aa57
SHA19503f8e217582ec6b472f8c5cfc89d8de02d4685
SHA25655112b8c6dcc15e3bd9a1a6594e4fab83c26f9fd0f39927fd9d075ab32470179
SHA5125a4345149a05b303398eb2e3383989894803539ba626d6f4e4e28574be0a7e667136437828df170f675eb5892c9ee20c4048b76ba5c8c9ff97c553d82f477e1f
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4