Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
setupsankomset.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setupsankomset.exe
Resource
win10v2004-20240802-en
General
-
Target
setupsankomset.exe
-
Size
241.0MB
-
MD5
5802ed418f7d1a5dcecb30f1fc721549
-
SHA1
c887a1224b27e6c26c26dccc4a4fea58c166c59f
-
SHA256
063447778809fafc3f6a09439828428eb1ab6c79d7d19cd6e7f75291a66ce4a0
-
SHA512
6123fd87037dfdb1deec99bd0eda23fe58685349954d54a725a22551d4e0e268b8eef6a807d3cd9bba7d7d085909ab97ded395388448e618e7a91c602368ea83
-
SSDEEP
6291456:VL0K/605C5bzPNhHetGwwdEuY91CneE8UEZy0yub48oaoZiWInBReVY:9tWet6GdCeEiZByuVFocWInLeq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 setupsankomset.tmp -
Loads dropped DLL 4 IoCs
pid Process 3032 setupsankomset.exe 3040 setupsankomset.tmp 3040 setupsankomset.tmp 3040 setupsankomset.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setupsankomset.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setupsankomset.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 setupsankomset.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31 PID 3032 wrote to memory of 3040 3032 setupsankomset.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\setupsankomset.exe"C:\Users\Admin\AppData\Local\Temp\setupsankomset.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\is-HCDVI.tmp\setupsankomset.tmp"C:\Users\Admin\AppData\Local\Temp\is-HCDVI.tmp\setupsankomset.tmp" /SL5="$400E0,252253223,140800,C:\Users\Admin\AppData\Local\Temp\setupsankomset.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.1MB
MD5b277e6ac242fcbc37f4d03e1528949c1
SHA12602407044a6bad216d3856eaf8fb990e0f1094f
SHA2569461ae8a13a57c0d8490916dc1e1bb20cb0c171b9852d0846a03c4c4d212f204
SHA51280d8b934ff63e4a7df3dabb9e6435c2d5ea542624b238be8a27b53c63be8dc244d46d4d9db1950b6d67d91dde12f3d819e7e4453536595d6385c65d2c6bbf5f7