Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe
Resource
win10v2004-20240802-en
General
-
Target
ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe
-
Size
7.8MB
-
MD5
5974fe67fc4651e2e9cf06d1eaf7f530
-
SHA1
22465d3e1e6d6253c4b553005aa8e3bc2726370c
-
SHA256
ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7
-
SHA512
bdddd1511adecc262b4a3d53c00d426d6adb6a3b88339ca7e1e755b84413ee93e32ed7efe24735c96bb3f1b7a64788ca1d57e3c936cf61b784e2e27859167a80
-
SSDEEP
196608:kOfsUO1xZxeYs6BBnGcFgPNk/JXa5HZ0Rv91Ddqt8fUpRnOW:kOfdoZxeYsCNyyRXG0Rlc6Up9OW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 acmsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"F:\\msdownld.tmp\\IXP000.TMP\\\"" ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: setup16.exe File opened (read-only) \??\A: ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe File opened (read-only) \??\B: ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe File opened (read-only) \??\U: setup16.exe File opened (read-only) \??\O: setup16.exe File opened (read-only) \??\Z: setup16.exe File opened (read-only) \??\S: setup16.exe File opened (read-only) \??\K: setup16.exe File opened (read-only) \??\H: setup16.exe File opened (read-only) \??\E: ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe File opened (read-only) \??\V: setup16.exe File opened (read-only) \??\Q: setup16.exe File opened (read-only) \??\N: setup16.exe File opened (read-only) \??\R: setup16.exe File opened (read-only) \??\P: setup16.exe File opened (read-only) \??\M: setup16.exe File opened (read-only) \??\J: setup16.exe File opened (read-only) \??\Y: setup16.exe File opened (read-only) \??\X: setup16.exe File opened (read-only) \??\W: setup16.exe File opened (read-only) \??\T: setup16.exe File opened (read-only) \??\I: setup16.exe File opened (read-only) \??\G: setup16.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ta02760 acmsetup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acmsetup.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level setup16.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME) setup16.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper setup16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "Running" setup16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "2" acmsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "Running" acmsetup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 3064 wrote to memory of 924 3064 ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe 30 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31 PID 924 wrote to memory of 2760 924 setup16.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe"C:\Users\Admin\AppData\Local\Temp\ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\setup16.exesetup -m "F:\msdownld.tmp\IXP000.TMP\setup.exe"2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:924 -
F:\~MSSETUP.T\~mdac.t\acmsetup.exeF:\~MSSETUP.T\~mdac.t\acmsetup /t mdac_typ.stf /S F:\msdownld.tmp\IXP000.TMP\3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510B
MD59affddc9de4ba7f5385ccc2801b52ade
SHA115de16c5d5cc4af98b7d33a4950cf9c0380a57a3
SHA25682954440bf5bf4dd63c4301e6587d98cc816fb94f2e8c4d88bce2ff55d859ec1
SHA512995a3ac82e418866dce4e971b322c9004d2f7722a2b93d5503a0fc87b4791721687881c16c17f256b743ec78591482c35f0495936a0fdc2c3bd8a22469737848
-
Filesize
31KB
MD5a88346c7d3c20df8ee796012330b6fc2
SHA1d0c1593845a67e760aa0ffb2b3c391e295f10f45
SHA2568878e1e600abeb4bd7324a8435f8ffcaea438743bdc9e0da154bdcf8ecc879a3
SHA5121a5ba18969dd1067b0c2dfebb84f09f121698c7290e5a5ccabb1c82aaeffa567f25947243a66d3584516791aee33f066651f044e5de6dfcd73bcdb82f866853c
-
Filesize
362KB
MD59b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
Filesize
14KB
MD573c25ae0c1769d5f9224c42918b1e02c
SHA183e8a696e68afdb91de5068fa1b4006a81c47ab4
SHA256bb01707fe351952e3719fafa3361642b81069733e6ce83b06b78ddc779eaaea8
SHA51249e969711a06c4f8f42ff0992d0fb51e3c57acce4f2d3d02cd2a51a4147ac7360b54233c0036d6f148001fdf599cdf176fbdc111f3096edf05d7b8e275d1cc39
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
180KB
MD52afc512e9c0b08f6e68f64c14e2ac604
SHA141b90f7d06550b9f2502ed8b32534a38a7687c11
SHA2562dbc87859812b6b6984cab01814a662fec2cc69560e8c1969abe58cc0d0d957d
SHA512a6a2c6324626d3d6d5b89fbee6fa7ec5793f4b297f9ff8b63bd6603a5cdde6c961636afff99522979c75a9375463e2ea128bda3e40225204f3a4d314f0a9fc5a
-
Filesize
10KB
MD5bb3291b2addc51860d724e44460a50ba
SHA158055cc8a1f8aef5e075ee34b943ef4d8c30c08b
SHA25663c50edecc6d5c1df94fbc9ccb0c88b8e8486be77681196e7b61c4b3afacd75c
SHA51202b7df2a8f1f450dce8dfa91792bbf3e8d96138c945057971e7da3e9edf37658b0d8ddd735a423cce008a9c626fa3011cbdb17437086a699d88ab52f9bfc44f9
-
Filesize
18KB
MD504779a4e3826b45173c9a36576d51a81
SHA14981a701128a15a87a2c4a70f73fa25ba253738a
SHA256ed001bf50f66901c40a01326405638185a8604caa045bb0fef8402bfdb59bbb1
SHA5129eb6db77c4328222f8fd37f3f4e9821ac9e7c54c6104485ae2c8453132b83fa04adb7c9502b62afb7808f55c1548edf9270928ac3470b38120a83da973f5d88f
-
Filesize
423KB
MD5b7bacd398e382b3e5998bb2053625563
SHA121fd13e22f06ffa87d373e131973738fafc8502e
SHA256666781754d3365d1d7ce632bf2fe67bc803ccdc754a5013471dcb9e73c7815df
SHA51216894a80add250edb205ac2b414cc632b49b24a26e06acf8f186eed0794e619ce3d8c02d8f056b5c47b26ef7de4dbce327df4fce95f4b25e449da3649d40776d
-
Filesize
276KB
MD5d5d072540f69cdcae1ddec6f116ea65a
SHA10e105e6968d868ba23b13d9eb1e83a34c2015aea
SHA256b9b3abb404481d98b0cb8ec3dd728f12a3f2505d4cc7e4c59e8509abfa694710
SHA51264748600aa32181d7ce5ad82238bc84606931275aff58858578fd9bc5c01fa7809c095195939c3811e91362f2470abeebccd93ed7921bd3342f7fe13a96fac66
-
Filesize
412KB
MD5779c065d6bf4b0d5c3f7edbb4248b84c
SHA112607c24cc7faf12e66de07163dd591f46473880
SHA2563ef37b982dc58b12f72c978e0bdc19f6af74fd2a582818788d422b6914c0698d
SHA5128b1ad291e6eca82cd3d63637ad14d6f5a1a27566c3ed59cced7591134719acd25f15865ac06e4c17d0d0cac546bdbfcc082ac6bf79da3ef898a3a2018cd98b9e
-
Filesize
85KB
MD508f4182e94ea4cd41ff12ecf8ef83556
SHA117baed3cfe30d4cf41e01167ca67c88e7f22b30d
SHA256aca13860b6a02749fe42e0f8cd856787065688071a27a7fb78cbba445a22c435
SHA5121d5daf32a08bf3f15737582a33ec879d8b7b8eb4c5333a360c80de2b76580582a0bc4871b09c23e0a0bbe8fca46ab735599338029af5f37e9e23c4b183b641c8
-
Filesize
324B
MD5c750112871fc7d6a37b9db626d2acce4
SHA1ae5d8fc99ee00698cdd853d096aaf46db7801306
SHA25613c8f2c4daade76c7e4ad4a4352d46fce89abd06857f2c76347945eb230ea387
SHA512f05875b3cf2890a083480373ee15ec468b5d2df7385aedf0eb73e8c15551550738fbfeaf51875aaf80534c90a3dff08bd1fe6c31eb478b922d2cf010bab892e3
-
Filesize
47KB
MD5933be9555b1ba4abf3ac8956511e0ed2
SHA10fd746bbc8465cae825f50e84139c3444fb9e2b6
SHA2566eaf180fd595d8e572da8c1739d0f231ee462951cd73b84e575082f905e5b50b
SHA5124f51166976617322c4c91a80668931b515c68e3732e1c6deb2acd44c34dcb13fd99e0f865448900b6bc35d2bc6a983a252dff7228177c53f4ba159eef51ad421
-
Filesize
67KB
MD56c58ec355ade4b1d14d59560b8e57c5e
SHA1b8a3cdadd63c1857903b78af2b33dfd8ebdb8572
SHA256f595054f3a56c87559e384a3ee942821768a49e78ed093221cb6badc022551e9
SHA5127f56c48e34e1c984eed6ac06eee25e714a4aa93f08a3b5b5a45f8af729e167f6f60bbdd6b27763ee858e90d78de01058736f2ed7bb2465ca9cb2ee1f728cf58d
-
Filesize
3KB
MD58a167d44d02c33aa5d8e52716e2c38cf
SHA1792a2dcba28f5a9cbc1611e79ad1d594ad39ff7c
SHA256f765a7227d81020b1c69359fe014ca941db5390660513f0070f27e3259aad716
SHA512c28b024aedc28c706d2217c39354bfbc45d3071e783719d514c7c5db42bd8f3528ce4d9484c656b208be615eeadbb9de144bb9f87265a1c237fdaae2490e3310
-
Filesize
23KB
MD59e68f82c086bfcec7468e276cd257367
SHA16ad8c341ae909676e68285e23aa3c4742820ea38
SHA256220dce873eb69e71935bf53068f7e33a44cf500c87106631eb5aca448fc61a2e
SHA5124bcddc1f5aa90fdf97bb635fed9699cf2249e36cca8b18a3961e472dff58c956898863677686cfeaef26156f6af704256a420ded585ccffdf30b2b0a3e7e6470
-
Filesize
155KB
MD5b6873acd87663d9e22725670911b586b
SHA1f146352286dfd8145a9d5064ad81b499ec523f2f
SHA2565cc36ea73ca05fe2b5784332b6452ec4b1625905059e973072c62cdaf503f2c4
SHA51266e66b07039a447907bc9a7d7d08a903bc58a204a32f1c37d95dc48bb37ce180127fa46249cd4a2b4c3759a4423e5f1ed11c9e77369754c182812c3199c366a2
-
Filesize
1KB
MD5dd74ecbc7334882c5042861d747c45d9
SHA1936f8bd60ccdf3af7f8b656feb2b12502152dbd4
SHA256660a977edbfafbb2e706d5a9854839bd6b335295489a0550767a948ee1358243
SHA51264ef77f1bbc1e16c630082771f36d1dfb8e6c38b725ab31c961d7a6c1da67993bc23d32180937ec1bdaba8df8307c0b67a2ca9f64d68b084a13a5e016401ebd0
-
Filesize
72KB
MD5eafa2804a87078afc643f8148dd8ec78
SHA15480542cf7b3bc18735044116acc6a341734ae71
SHA256e40a42fafeb4d353f54aa766714577a14956c063450058cb70d48b41f5739063
SHA51250fffecff1dd81bf7d851b38c809f3a20a4c224e80954fdbe53bca6e92d96ed1f8aa542cd22eea57f4ed1a8533f3fb9de500dd6d1f0a071529fd9587d7c07ee7
-
Filesize
149B
MD56822179556122e9bbca69d177e24ca36
SHA12669511fb9f2373546b45680b46b59c29bece8f3
SHA256194250402400908a1051115b5a05d18473d0f8f8e9dfffdb10b23b583987b765
SHA512439893a10338d77f8b1f0302034894a699d50c25500405350e717cb9a24c08efeb5d0a5367ae07d64cb2e66e8b8419b80429206b244243a0d0b3f4f65072013b
-
Filesize
84B
MD50bc2472ec42a4fc4742c817b121a0c57
SHA17328477a9f2311d9e4d72e1ea261031fbb19fc92
SHA2560879e69ee425d61731589b4331358d20248c58362dd636f84b5a513f0aa4bd81
SHA512cccfad839371a41e8ca65e57165beb55059580cdfc8abb4b73e60823ca95473783aff6e02997b6a506ff6ebb5eaff86737e9db19fc4cbe06574f9224f04d7376
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
424B
MD5e846071c193b5acde9a677f0407881ca
SHA16c48d01c259894e5dbbf8c0dd6286d27d8de54b7
SHA2563b47490b64ca59548fcbb15939721269f4262272af46ce84798738cafae4fb32
SHA512bfe31f3c1b6792e839ae18f1dd79e04fa3d60d7581b23cbfd3ad3f5b7df875e94f5bb13c92c1b203f99174e3979a456d96ca65f1f494406c4f29a390b904b2ee
-
Filesize
1KB
MD5983ab7cc7e33fde9480b1a680abc093f
SHA1910e56f2f178a82a5acf7bca62d5ba5de76bf88e
SHA2568f6e1e97be6d1d6b9d0089a6c32d4123d3a4a3950f1b952d67e9d8a8d388eb7c
SHA5129f766a69fe10fe9d7c4be07f77cbf1efe48f435dfb7fc2fd50ff6fff811e8ad694685924bf669e12f715836288e82cca900842ab57c2269f3312163d684d84e3
-
Filesize
1KB
MD532ff2d3021b65f18a6fb2840913ee4b0
SHA15f54322d75112ea8bab954e89d5353d16123a0f4
SHA256cc51fd2445de59dc6a27b4b9f43bf3fab21603b96fe22c6dcc6e8edf545e5d91
SHA5124ecf97a32bd5b836133f148a6a989d6ddde4156c316433e40c595a7c2835ff54e0182369e4504fecd6fc60cc9b73aa532a6e68827a1ecda5a5c07ae2a1f80fd5
-
Filesize
1KB
MD5ae27d7f8fa0f1aed1cd603bf69857336
SHA1ba6a945f19b40e672f285c427ddf18f662c03ae5
SHA2561d2b67e5c89949afa22cda8c3fa5d973c221a6c8af708334d2ab92c7f910bdab
SHA512fc24de7093337d5267d36e1fbcc4c306cc0b489a6bec894c2d37ec8702b7b371829b6ad48240af986db44900061a184cb03f4385bcb0d2384bab2425eefda629