Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240802-en
General
-
Target
Setup.exe
-
Size
90.9MB
-
MD5
35550821640d1e7c79a9183ae8ad4b6f
-
SHA1
5a6f011160383bbfe7688747bc23039a4a9ec90a
-
SHA256
ddb6a5377245051ba0380e051e2fa4d5a38c144ed55e17bd9fe9f659318d5fa6
-
SHA512
070d7537c6bde23a695fe72e12d3c8dc5b53775036c85580d57c7db6b58a05768d897a716bc3e5f96ac667f085fa567a51b5d8bac42b31254d16e9baa75362c8
-
SSDEEP
1572864:01dkkGFinQ6dkkGFinQ6dkkG5hnFHxDE8aJQwmRuRdF+9+S+V9LyN0C1qh6maq9:06FiQ9FiQ9/V51My+p3uN0Cab
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe -
Executes dropped EXE 3 IoCs
pid Process 2600 launch4.exe 2400 LetsCorp.exe 1428 nmhdYVr.exe -
Loads dropped DLL 11 IoCs
pid Process 3036 Setup.exe 3036 Setup.exe 3036 Setup.exe 3036 Setup.exe 3036 Setup.exe 2400 LetsCorp.exe 2400 LetsCorp.exe 2400 LetsCorp.exe 2600 launch4.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINDOWS = "C:\\Program Files (x86)\\P42iBA\\nmhdYVr.exe" launch4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\LetsCorpSetup\mfxplugin32_219tg Setup.exe File created C:\Program Files (x86)\LetsCorpSetup\d.bmp Setup.exe File created C:\Program Files (x86)\P42iBA\templateWatch.dat launch4.exe File created C:\Program Files (x86)\LetsCorpSetup\t4.bmp Setup.exe File created C:\Program Files (x86)\LetsCorpSetup\tank.bmp Setup.exe File opened for modification C:\Program Files (x86)\LetsCorpSetup\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Program Files (x86)\P42iBA\t3d.tmp launch4.exe File created C:\Program Files (x86)\P42iBA\t4d.tmp launch4.exe File opened for modification C:\Program Files (x86)\P42iBA\libcef.dll launch4.exe File created C:\Program Files (x86)\LetsCorpSetup\h.bmp Setup.exe File created C:\Program Files (x86)\LetsCorpSetup\tex1.bmp Setup.exe File created C:\Program Files (x86)\P42iBA\VCRUNTIME140.dll launch4.exe File created C:\Program Files (x86)\LetsCorpSetup\LetsCorp.exe Setup.exe File created C:\Program Files (x86)\LetsCorpSetup\launch4.exe Setup.exe File created C:\Program Files (x86)\P42iBA\t3d.tmp launch4.exe File created C:\Program Files (x86)\P42iBA\MSVCP140.dll launch4.exe File created C:\Program Files (x86)\P42iBA\nmhdYVr.exe launch4.exe -
pid Process 912 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launch4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsCorp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nmhdYVr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nmhdYVr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nmhdYVr.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 912 powershell.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe 1428 nmhdYVr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 LetsCorp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 912 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2600 3036 Setup.exe 31 PID 3036 wrote to memory of 2400 3036 Setup.exe 32 PID 3036 wrote to memory of 2400 3036 Setup.exe 32 PID 3036 wrote to memory of 2400 3036 Setup.exe 32 PID 3036 wrote to memory of 2400 3036 Setup.exe 32 PID 2400 wrote to memory of 912 2400 LetsCorp.exe 33 PID 2400 wrote to memory of 912 2400 LetsCorp.exe 33 PID 2400 wrote to memory of 912 2400 LetsCorp.exe 33 PID 2400 wrote to memory of 912 2400 LetsCorp.exe 33 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 PID 2600 wrote to memory of 1428 2600 launch4.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3036 -
C:\Program Files (x86)\LetsCorpSetup\launch4.exe"C:\Program Files (x86)\LetsCorpSetup\launch4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\P42iBA\nmhdYVr.exe"C:\Program Files (x86)\P42iBA\nmhdYVr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
-
C:\Program Files (x86)\LetsCorpSetup\LetsCorp.exe"C:\Program Files (x86)\LetsCorpSetup\LetsCorp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"3⤵
- Drops file in Program Files directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
11.4MB
MD564e5c8ab7f52f6d93406334465645d99
SHA13e0883b77c04103e66cc86dab78e1728f30ed42e
SHA2565a0659bc66ac45de2ab7caa6c3a644a95f3e6b8732e5718054b116207c4d82a4
SHA51242857b1d9774a26ad13d22664653b18c49a0810f30d9dd9099d9333c68b49ddef4a0b54a44fcd6ed5971afb306f4b86fbd2251b8c7af4291747dd0f0c5104085
-
Filesize
866KB
MD540bff823869b51e4395153995cd38205
SHA12e32382f4df9f7758bf01ef417603ab3dff9752e
SHA2562657f884fbecb7b7a7af2cac7d012b274d00d828bf28ced044be087386a4c297
SHA5127bc79271272eb89ec7f5a5045fac52fb1f1117fc327172a0e3fba19db87bb3d30d00d16e13e90e9a99294230448e4a0155f244c1d7ad7e14a3e6b16751daad1b
-
Filesize
138KB
MD59ba816bfd9c6214c4974b4fab76bb0a6
SHA1059fb24dcf8f10d443150102d937cd67b88106e8
SHA256789f8a260c6a514bafff4925a5f2b2d1459093eb6a0981c5950b22568ebfd18b
SHA5127baca2ed36d645e227bc2651a3ec81b7a18dad16ec9781e0d41c4c3ad0b17e8f956b20076d2e2d7c7289491f51ddf6191ab76b89d6e3a84ea87767e394e0bed7
-
Filesize
1.4MB
MD54679933c6f1204ea6cd0d2e0e8ace335
SHA174b41b468d9e5bad11a3a68bc759d8b10b95096d
SHA25651b5b1c476f3c313793853ab833ee3c926131b38807b18a3913dde5e9c3f31e2
SHA512b455411f3db329494fa7bd894209db7725784d7bcd073baaef910b0624b209e691c1242da0838a378f3a6b9b295a142b74f8c47da9ce9d8e15bd32dcf941c2d0
-
Filesize
1KB
MD51ec7dd642da5c4418e9fe6ef10972948
SHA15bdb9f5f9a3fdb6012c97f5e90b0ed0454fea0c6
SHA2560ec4f9a48819d6f4821d16df1e4ed2fed7c477a7f814dd709127ffb49b9f999f
SHA51296a9847372aa82d8d889d171f3d505b8865d5516d990040de8699a17137533ab2dff24e580fb5b9f2defe03f785e43fec51646d9d71bbc6df4e5e6d4e1bf0dd6
-
Filesize
1KB
MD5abcdaf85028f80f654b3686d29014964
SHA1d5d1ee9565f6d154172df61eb2cfe50b04970ac1
SHA25692ac4863913876a446f61df1b805ecb119f5ce27a6c458aace5d74235bcc807f
SHA512c7cd06f8a82350cbddff5c50d07954363016bd5471e36048e945ecb7b649f1335c40d345787a8e8d34871b9010c1e7fb1e1cd1e0bff3b6c9022d1d2e9e75ad9e
-
Filesize
29.1MB
MD5597cd30fd43bbd1b7860e249061c555f
SHA1676f2f92da2985d62103995d821a1f9012f190f9
SHA256a4bede8f47d510ae66d4a0b63566fbc21a80d3913a99a52030d0b432e343280a
SHA512dcca1170cb026a92ae2f5e159b66f9d30e501e63281a81636d51fd44927fc6da2d8bb6645c993364d3a5915269ef3218842baff042859c5b389a5ef399c2505c
-
Filesize
77KB
MD59d5a742f221c4929a178baf2b93fc7fb
SHA1928c9e0e1c18ec474c2f450ca00a154e44ac547a
SHA256f10727074bcb4375f276e48da64029d370299768536157321fb4bd9b1997b898
SHA512f4614962c67bb41b8a2fb17e3112745f4ba012bbf382c1cc7deacd6c8525a53d75890a2eb46f0da61bfa054dc52505b09a29291d5fa1c25c6201a66b9dc4b547
-
Filesize
3.0MB
MD5a3e9a318d0bb16091b862f4bf70c73b6
SHA1f3abd6519c705c46ba0e5d6a6bc2f3b48e945d03
SHA2567a5f94516f2dcadf478c6936c234cd9b9d28d3fadc55b346485dc1ef6194f003
SHA5129e1dd2116fc0c3afe4807a717ac08d730f4fd2d9a28628516ea0def7a9b8b7432ecfeda8ad7901ce6137f34b406ed16f72234b8f05228688e356f5fcf64289ac
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094
-
Filesize
15KB
MD5d1eefb07abc2577dfb92eb2e95a975e4
SHA10584c2b1807bc3bd10d4b60d2d23eeb0e6832ca2
SHA25689dd7d646278d8bfc41d5446bdc348b9a9afaa832abf02c1396272bb7ac7262a
SHA512eaffd9940b1df59e95e2adb79b3b6415fff5bf196ebea5fe625a6c52e552a00b44d985a36a8dd9eb33eba2425ffea4244ed07a75d87284ff51ec9f9a5e1ac65e
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc