Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
jv16pt_setup_hb.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
jv16pt_setup_hb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
jv16pt_setup_hb.exe
-
Size
5.9MB
-
MD5
3253fe5edc8d91b933c9478e0a938417
-
SHA1
991408c0109b2f5e18e458249cc0c11f4c401977
-
SHA256
2021994d9c40e702ed175dfd3f08a16669f18530db94e040fcb838f9d4c1a60b
-
SHA512
0d3d491fcff3ceb5eda849d9633259c8add5805197b4cad4849a1eae8385fc5f035ec3da182a961f3e6baac9b11aeb3548323c5da6cda686c5ce660213bdd693
-
SSDEEP
98304:dlb6ASvncOtuBToEZBY54iTQ47yMdzv87zIilkNxFK4Wre1XChXOJKWdtO37:+zcOtwsEZBbi0GdzuTGN7K4WreaOJ1dM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4572 is-0I4O1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jv16pt_setup_hb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-0I4O1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 772 wrote to memory of 4572 772 jv16pt_setup_hb.exe 82 PID 772 wrote to memory of 4572 772 jv16pt_setup_hb.exe 82 PID 772 wrote to memory of 4572 772 jv16pt_setup_hb.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\jv16pt_setup_hb.exe"C:\Users\Admin\AppData\Local\Temp\jv16pt_setup_hb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\is-FS2GF.tmp\is-0I4O1.tmp"C:\Users\Admin\AppData\Local\Temp\is-FS2GF.tmp\is-0I4O1.tmp" /SL4 $D0046 "C:\Users\Admin\AppData\Local\Temp\jv16pt_setup_hb.exe" 5992458 527362⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5f627721a34c13a5307779a498e8f6519
SHA19e54ec07e780eb1ccbbd61bb1a24238e46c01e18
SHA25613c6a795a259a9731d5c00f35e6eeeeae840423d3e1783fd6c75509a3b7cb348
SHA512c2dc88b441539b8827f0ef2a4c6b404cebaa5452d884d0174a2447347a462552f47a9d6521ecfa660cd9f0e0771fc192438865dcda305ab373c6f9a0c694aecc