Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 23:52

General

  • Target

    Setup.exe

  • Size

    90.9MB

  • MD5

    83e15fb21f990b6aac1d0c13035609c2

  • SHA1

    bba425a7f5bb82361aa06c1f6085793ee9e76548

  • SHA256

    23cf52d165ead3e87f711cdb1cf1a34afe32788bf34334caa158b2ba164dc17a

  • SHA512

    b740bf73f930a6dd4b1d49cf21e3f1eb1fcd687351a954e99b8b37abfd6d211a14947e90ce69bc06ecb44ee53a50a93f39c4e5a5cf48874b2cda8af4d2a3c0dc

  • SSDEEP

    1572864:0HdkkGFinQ6dkkGFinQ6dkkG5hnFHxDE8aJQwmR5F+9+S+V9LyN0C1qh6maqO:0YFiQ9FiQ9/V51W+p3uN0CaY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstAD02.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    f8f61c1bd1103e2bd3772128eddad90b

    SHA1

    6f22a7b5f7e9d15d7c1db43c67c264bf3005ad05

    SHA256

    52fb8909596f2428c80020742be67cd0570592b56106d6148a806d6f9e1144e6

    SHA512

    672c2de50c9c1de9bec9d812b915fbf788f94dd27cf9666658c0a9d23ea4ad2a57899de557f9624795ed932e43c90233888882f0e859e2a77a51091c6031c658

  • \Users\Admin\AppData\Local\Temp\nstAD02.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    d1eefb07abc2577dfb92eb2e95a975e4

    SHA1

    0584c2b1807bc3bd10d4b60d2d23eeb0e6832ca2

    SHA256

    89dd7d646278d8bfc41d5446bdc348b9a9afaa832abf02c1396272bb7ac7262a

    SHA512

    eaffd9940b1df59e95e2adb79b3b6415fff5bf196ebea5fe625a6c52e552a00b44d985a36a8dd9eb33eba2425ffea4244ed07a75d87284ff51ec9f9a5e1ac65e