Overview
overview
10Static
static
10setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10$PLUGINSDI...gm.ogg
windows7-x64
1$PLUGINSDI...gm.ogg
windows10-2004-x64
7$PLUGINSDI...in.skf
windows7-x64
3$PLUGINSDI...in.skf
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...sh.bmp
windows7-x64
3$PLUGINSDI...sh.bmp
windows10-2004-x64
7Resource/1.bmp
windows7-x64
3Resource/1.bmp
windows10-2004-x64
7Resource/10.bmp
windows7-x64
3Resource/10.bmp
windows10-2004-x64
7Resource/11.bmp
windows7-x64
3Resource/11.bmp
windows10-2004-x64
7Resource/12.bmp
windows7-x64
3Resource/12.bmp
windows10-2004-x64
7Resource/13.bmp
windows7-x64
3Resource/13.bmp
windows10-2004-x64
7Resource/14.bmp
windows7-x64
3Resource/14.bmp
windows10-2004-x64
7Resource/15.bmp
windows7-x64
3Resource/15.bmp
windows10-2004-x64
7Resource/16.bmp
windows7-x64
3Resource/16.bmp
windows10-2004-x64
7Resource/2.bmp
windows7-x64
3Resource/2.bmp
windows10-2004-x64
7Resource/3.bmp
windows7-x64
3Resource/3.bmp
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 21:25
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dat_bgm.ogg
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dat_bgm.ogg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/dat_skin.skf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dat_skin.skf
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/splash.bmp
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/splash.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Resource/1.bmp
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Resource/1.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Resource/10.bmp
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Resource/10.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Resource/11.bmp
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Resource/11.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Resource/12.bmp
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Resource/12.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Resource/13.bmp
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Resource/13.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Resource/14.bmp
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Resource/14.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Resource/15.bmp
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Resource/15.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Resource/16.bmp
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Resource/16.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Resource/2.bmp
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Resource/2.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Resource/3.bmp
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Resource/3.bmp
Resource
win10v2004-20240802-en
General
-
Target
setup.exe
-
Size
3.9MB
-
MD5
81e69b29c4c09391a12b665e7661f48e
-
SHA1
b103b694d12544c9db444badd9e2263d219698b1
-
SHA256
81e45c1e6d6a718624159e116e6daa8c1547f39bef7f56163303e7eca8abfae1
-
SHA512
5476b9fa6967aefcb73793c965224c93d2ab46268830fcb71c69bc864e22e0cb92512959fe7a728ee77c2bde00e3ce9eda64d015ff1ef34273292707680c0042
-
SSDEEP
98304:QhVVJqioKMFh1qKsbZcMgsGwNmlCNE4CJgcMyfQP/4:QhV1pMzHQCMFGImHgcM54
Malware Config
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000002348d-34.dat family_strela behavioral2/memory/4780-37-0x0000000004680000-0x0000000004C4D000-memory.dmp family_strela -
Loads dropped DLL 13 IoCs
pid Process 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe 4780 setup.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvcr71.dll setup.exe File created C:\Windows\SysWOW64\mfc71.dll setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4780 setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4988 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4780 setup.exe 4780 setup.exe 4780 setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4780
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ac 0x2c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD513cc92f90a299f5b2b2f795d0d2e47dc
SHA1aa69ead8520876d232c6ed96021a4825e79f542f
SHA256eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb
SHA512ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3
-
Filesize
101KB
MD5a8af308ff01b4477657955fbf0cc8408
SHA10794c059f0326e4a71be8a3ee4ac17a657d90d88
SHA25614a38f56be50a3829eb1eda2a908da2de5913f81d5cb01d8b668593d0fc36594
SHA5129e221967db95d4b86bf311891193dfd1515806aa0d43198d3bc26a17d77f06f212ab9dba1ca8575f50d224380e8b109529faccf2f56daac834da83a83677a0fd
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
5.8MB
MD5028251654a4d65509aa8ccb5f2ee284a
SHA14a4ad468a86df6b903002be4f8919017fea0c152
SHA2568b25cf3f7aa82fadccb2ce615ce0e40c5a8a3ea7bc51180a92173ee113a0ccfe
SHA512f252670bca0da9e8e2c519a6ef4ad6dd0c4e548aeb7566693a7d203e73e63345fc58683072020ef771d836429bed1d7b4fdf105aa3e62a969e9c8d39556e1d2d
-
Filesize
792KB
MD58fea8fd177034b52e6a5886fb5e780bd
SHA199f511388a2420d53b8406baed48ba550842eaad
SHA256546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de
SHA5125d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
710B
MD548933ebac2a8423cc37e0d2d0d4487ef
SHA1a1b4281f260f5e135f2f274df0063868e0b3d25e
SHA256e8fbaf0aae7972ff134f22f836a851d03428449eb72b13ea5ca60b4d6542f9b5
SHA512286526d76403b249368708dc27cc19564c0bb98b6b6b2c25e07cdd21d9f4ebb1d8df0f447e9d164676117ab336fde68bee12597ca8cc9dc21707fb541aeb8f5d
-
Filesize
1.0MB
MD51fd3f9722119bdf7b8cff0ecd1e84ea6
SHA19a4faa258b375e173feaca91a8bd920baf1091eb
SHA256385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823
SHA512109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6
-
Filesize
340KB
MD5ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e