Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 22:57

General

  • Target

    setup.exe

  • Size

    11.7MB

  • MD5

    1287223e90507c1ac0bc0b60f1b039e9

  • SHA1

    7853f575349907eabb0dcd190fe746eb1c1c8d01

  • SHA256

    b13ade9fa58f96d8f03e4e241455c1af226d6b654e2ad48a8ae7d3a61f7ad64d

  • SHA512

    b90117cee136da27aefe612c73284a9977fe836ac364afc68d7bb78ca6828efd21b60b2c9ba866a6bcf0479db1c64eef6fe06b4ca0ccb0f2d8a3e3b333361d2e

  • SSDEEP

    196608:uRRS34smUEH4IXhxpMzHQCMFGfDQ5jSajl3clBg3j/cWnoCfrR1:uq/fRI9MzaGf0nl3cli3J/

Malware Config

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\nsyDB33.tmp\shareddlls_install.exe
      "C:\Users\Admin\AppData\Local\Temp\nsyDB33.tmp\shareddlls_install.exe" /S
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyDB33.tmp\ioSpecial.ini

    Filesize

    564B

    MD5

    14863abbd68e6eb5e05f78a1af7e2a74

    SHA1

    6e7b97fdcac2b08facbe18fb3d75ff2b69e42455

    SHA256

    392b8f5bc8f51719a7f6f6c104a3651b85d7ebbeeece092f53773471abd83408

    SHA512

    94f02ac62746a2f2890544753117b84e3c01881f0b9b0aa21553ca3f3dbab71dab498b5ea697ae136ff9c331bed8b53579c20bd4da111ebb808813d343f5cb6a

  • C:\Users\Admin\AppData\Local\Temp\nsyDB33.tmp\ioSpecial.ini

    Filesize

    702B

    MD5

    c540d2914dbb862bc56e3b90b5f2e53d

    SHA1

    8ab146e14a975cc1a0f9da8fd0b5757486fd6690

    SHA256

    a119a1f2ecacc2cc429315f516087a521a17e8d21248ae4e3cafeff7f40ac3d0

    SHA512

    bfd31840a6e0105f3e3f48763c7a2b1ca5af1e7726995c6c246504988a51f336b68d0d70da50c2ddf2cd81b227632067260f799751ba5a1a939682542a227062

  • \Users\Admin\AppData\Local\Temp\nsj279F.tmp\AccessControl.dll

    Filesize

    10KB

    MD5

    055f4f9260e07fc83f71877cbb7f4fad

    SHA1

    a245131af1a182de99bd74af9ff1fab17977a72f

    SHA256

    4209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc

    SHA512

    a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26

  • \Users\Admin\AppData\Local\Temp\nsj279F.tmp\ILInstallUtil.dll

    Filesize

    94KB

    MD5

    e331583b908a92193e0be215611c7309

    SHA1

    937106392134173fa3cd640c66ceea5152028e3a

    SHA256

    be44e27e8b1c78a2696451c8afa21412136bea12bc033ff9d0251922b4c97631

    SHA512

    35602924859dd83f23c728446b84e2c89fe4fa83a33842e50e96b7442ab16205ce634643185d13e086253e79685f0fbbb6c474c057b061f566ff763cbbc7d240

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\AdvSplash.dll

    Filesize

    6KB

    MD5

    13cc92f90a299f5b2b2f795d0d2e47dc

    SHA1

    aa69ead8520876d232c6ed96021a4825e79f542f

    SHA256

    eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb

    SHA512

    ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\Bass.dll

    Filesize

    101KB

    MD5

    a8af308ff01b4477657955fbf0cc8408

    SHA1

    0794c059f0326e4a71be8a3ee4ac17a657d90d88

    SHA256

    14a38f56be50a3829eb1eda2a908da2de5913f81d5cb01d8b668593d0fc36594

    SHA512

    9e221967db95d4b86bf311891193dfd1515806aa0d43198d3bc26a17d77f06f212ab9dba1ca8575f50d224380e8b109529faccf2f56daac834da83a83677a0fd

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\GetVersion.dll

    Filesize

    8KB

    MD5

    e013b625f5ae1e2f0b442cf39c0069df

    SHA1

    9ec785b63279144c091366badda65278c4cdee20

    SHA256

    16dd6da98b7e53d374830cd4c644c01b112955f8487a285f34dc0353e9cfac15

    SHA512

    306f7e674d119d129db48012c43f825bffabd078fac8518aea9d514b0787752a2e876bda2ad15df7332bfc8cfba38a0d1be17ee7c58a27e09678fce9aec58418

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\NSIS_SkinCrafter_Plugin.dll

    Filesize

    5.8MB

    MD5

    028251654a4d65509aa8ccb5f2ee284a

    SHA1

    4a4ad468a86df6b903002be4f8919017fea0c152

    SHA256

    8b25cf3f7aa82fadccb2ce615ce0e40c5a8a3ea7bc51180a92173ee113a0ccfe

    SHA512

    f252670bca0da9e8e2c519a6ef4ad6dd0c4e548aeb7566693a7d203e73e63345fc58683072020ef771d836429bed1d7b4fdf105aa3e62a969e9c8d39556e1d2d

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\SkinCrafter.dll

    Filesize

    792KB

    MD5

    8fea8fd177034b52e6a5886fb5e780bd

    SHA1

    99f511388a2420d53b8406baed48ba550842eaad

    SHA256

    546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de

    SHA512

    5d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsyDB33.tmp\shareddlls_install.exe

    Filesize

    2.8MB

    MD5

    4fe8ff7f02020ea655944db5541722f3

    SHA1

    b5ff619c215529a4531337eef36167051cded658

    SHA256

    599c63aa0d0496363c7c99217e6c3d941125907cc4ea4c7d5d73c9b54e3deaee

    SHA512

    f4802d00d46c59882a1e1d3b8c0a43fd2ba4b22819d5417ad81cf4522e796176a920f81a6753e8297d49b3b0e60f3e1c27e4fbff2a6cc100d01cd0a39a75b4e3

  • \Windows\SysWOW64\mfc71.dll

    Filesize

    1.0MB

    MD5

    1fd3f9722119bdf7b8cff0ecd1e84ea6

    SHA1

    9a4faa258b375e173feaca91a8bd920baf1091eb

    SHA256

    385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823

    SHA512

    109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6

  • \Windows\SysWOW64\msvcr71.dll

    Filesize

    340KB

    MD5

    ca2f560921b7b8be1cf555a5a18d54c3

    SHA1

    432dbcf54b6f1142058b413a9d52668a2bde011d

    SHA256

    c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb

    SHA512

    23e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e

  • memory/2148-14-0x00000000028CC000-0x00000000028CD000-memory.dmp

    Filesize

    4KB

  • memory/2148-261-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-23-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-24-0x00000000028CC000-0x00000000028CD000-memory.dmp

    Filesize

    4KB

  • memory/2148-270-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-22-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-13-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-193-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-38-0x0000000004CD0000-0x0000000004D9C000-memory.dmp

    Filesize

    816KB

  • memory/2148-259-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-260-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-30-0x0000000004700000-0x0000000004CCD000-memory.dmp

    Filesize

    5.8MB

  • memory/2148-262-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-263-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-264-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-265-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-266-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-267-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-268-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2148-269-0x0000000002880000-0x00000000028CD000-memory.dmp

    Filesize

    308KB

  • memory/2188-162-0x00000000003D0000-0x00000000003F1000-memory.dmp

    Filesize

    132KB