Analysis
-
max time kernel
21s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
General
-
Target
setup.exe
-
Size
4.9MB
-
MD5
17f1745b8e7131da56e0536af9b94a24
-
SHA1
244d7abe41793482507221f80b3422c6f1ca05b8
-
SHA256
8dbbc87e47e010fbbffd7ee1dc1c0567309f19600c2eb81e12a80e5ff997dfdf
-
SHA512
607b180e20ee91f9e48392476e53b6a99e251ddf0c3cf62b8be607d07edf74cc2a66c7992df2e4039898fd913ef6979344662508c83acd773b73cd465aacde7a
-
SSDEEP
98304:sx0o2lgASNpJsesUOd1AACNxyJFcbqjmd/vOhYslS8asg:sx0YpsEOjCmc7+GP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation _iu14D2N.tmp -
Executes dropped EXE 3 IoCs
pid Process 4884 setup.tmp 1368 unins000.exe 1216 _iu14D2N.tmp -
Loads dropped DLL 6 IoCs
pid Process 4884 setup.tmp 4884 setup.tmp 4884 setup.tmp 4884 setup.tmp 4884 setup.tmp 4884 setup.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Need for Speed Carbon\unins000.dat setup.tmp File created C:\Program Files (x86)\Need for Speed Carbon\is-A7AUF.tmp setup.tmp File created C:\Program Files (x86)\Need for Speed Carbon\is-9M6HO.tmp setup.tmp File created C:\Program Files (x86)\Need for Speed Carbon\is-3G40E.tmp setup.tmp File opened for modification C:\Program Files (x86)\Need for Speed Carbon\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\Need for Speed Carbon\unins000.dat _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _iu14D2N.tmp -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4884 setup.tmp 4884 setup.tmp 2228 msedge.exe 2228 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4884 setup.tmp 1216 _iu14D2N.tmp 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4884 2840 setup.exe 82 PID 2840 wrote to memory of 4884 2840 setup.exe 82 PID 2840 wrote to memory of 4884 2840 setup.exe 82 PID 4884 wrote to memory of 1368 4884 setup.tmp 91 PID 4884 wrote to memory of 1368 4884 setup.tmp 91 PID 4884 wrote to memory of 1368 4884 setup.tmp 91 PID 1368 wrote to memory of 1216 1368 unins000.exe 92 PID 1368 wrote to memory of 1216 1368 unins000.exe 92 PID 1368 wrote to memory of 1216 1368 unins000.exe 92 PID 4884 wrote to memory of 5068 4884 setup.tmp 94 PID 4884 wrote to memory of 5068 4884 setup.tmp 94 PID 5068 wrote to memory of 3176 5068 msedge.exe 95 PID 5068 wrote to memory of 3176 5068 msedge.exe 95 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 680 5068 msedge.exe 96 PID 5068 wrote to memory of 2228 5068 msedge.exe 97 PID 5068 wrote to memory of 2228 5068 msedge.exe 97 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98 PID 5068 wrote to memory of 4288 5068 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-OVIBK.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-OVIBK.tmp\setup.tmp" /SL5="$5011A,4674332,140800,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Need for Speed Carbon\unins000.exe"C:\Program Files (x86)\Need for Speed Carbon\unins000.exe" /VERYSILENT3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files (x86)\Need for Speed Carbon\unins000.exe" /FIRSTPHASEWND=$70232 /VERYSILENT4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://torrent-igruha.org/557-r6503-need-for-speed-carbon-repack-igruha-776-1.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa475c46f8,0x7ffa475c4708,0x7ffa475c47184⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:24⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:84⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:14⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:14⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3750252936347953436,9900724058795947239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:14⤵PID:2428
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5516b46d8ba74c15af629e09e05e02cdd
SHA197955bea20b21dcf4d97c5783c569647bfa405f3
SHA256eb495744a32b3d773cdc6aad2c1570c991923cd4eb4c8a21db8f722f37f96156
SHA5121413b762d9a4754ae28654a4e31f51674cdab4708b0290fcbc0860a6d44b6f81083a62ef72676628fa6165eecf8a75c4f92a9f6dd243ff9515a8324c591d6336
-
Filesize
324B
MD59669ab59e92bea5a3765a3514a34fced
SHA1bf1b53f7de2e63ccacb0a6beef9f69b7d6423ba9
SHA2563e66345d27d34b972387e6d8d3ec848d7ef2491cee04ecb92276c04285bda871
SHA5122770db8661468cdbedaed0c94ed2c595e9309bc0abe75683088a1463f27e40276ed888a25f72751f5b697085784eaa84da2551c987c6d66894c89ab1c4818082
-
Filesize
74KB
MD5d112b4d76915c91a30c3833da0566a3b
SHA14fe51c873214d40398bc1d758f4f6475082ed450
SHA256688f7ee5c0c2c968d7a43d1c85f227f296419d1d7b3d04c3ba39da0d00213ace
SHA5122d0984a64b517596fc1434417595d263efe821800ec2baed0489ab1b78ed95a7c6b4574d6aa52ba03e50311917876d50bf498ebdd3c17ed73d97445c065e84ae
-
Filesize
1.4MB
MD5018ffcee075013212651679b898e57c8
SHA1fa4754a0b9cc0e61fc7fa4462f5edb02fa10707e
SHA256c375d5bd6819f823a42f007ee23ac7af10e3648ac361113c553765e0ce23824f
SHA5120ff1ba61943368b1571cd79f678e39ae526d287731a126ac7ff8f483f94bcb1d59b4053ca7bf915aaa704fa66858d1059ede3883f883b27e21fcc537ea602776
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
5KB
MD5dcae65c0815c0878600192b60d350bd9
SHA1b77ce387f0c6c62c5adcf6422df361f9c90c5c53
SHA2566f10bcf6c5bbe356a872a479e703077f965a2e6cf0325454197d2b5d93f309f4
SHA5127b61c1715527780af49c3bef60024a89ae4a0e2e9ba7f6571e713dfb9dd8a8e7b3549e740956ff5ce0c2118c1dc838f2aa0eda211cf5077cc9478e37f5e32a94
-
Filesize
4KB
MD5f07e819ba2e46a897cfabf816d7557b2
SHA18d5fd0a741dd3fd84650e40dd3928ae1f15323cc
SHA25668f42a7823ed7ee88a5c59020ac52d4bbcadf1036611e96e470d986c8faa172d
SHA5127ed26d41ead2ace0b5379639474d319af9a3e4ed2dd9795c018f8c5b9b533fd36bfc1713a1f871789bf14884d186fd0559939de511dde24673b0515165d405af
-
Filesize
452KB
MD54feafa8b5e8cdb349125c8af0ac43974
SHA17f17e5e1b088fc73690888b215962fbcd395c9bd
SHA256bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71
SHA512d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
1.4MB
MD5d50a6bdcf37d093fc472fcbb6489069a
SHA1d3f5d6892e4ce3018f8cf441021ace1d9a5b8732
SHA2564252ef0ec82de8b6634f1b873cbd0a73193bd64dd49cf36f598940817835e10e
SHA5128304e0211c2f6c96c3d5836175146a6f66a4deba32678e4da6df1715086c19ff6906f48621c472be0247ebd7f18851fc63f72d0657c6b686e1ae9d616c088a4e
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD55ad33cb033a60f4b76dc8383eebf96c0
SHA14d7a64f3af26a1c7c5b775668bdfac094634e009
SHA25652cf417012ede14a1b7fe2980a928c7c53f9245f1be601f1a1b3eb62dd06c30f
SHA512627b24010f76e34360e68509a1bdb2b6a4d6b937d3fce284e3971a15909f88b29399ae24576e15eba10f29a27934d59a6e07c88d2ba8033f77e6114c97c2fa11