Overview
overview
10Static
static
3183c36ee3a...0f.exe
windows7-x64
10183c36ee3a...0f.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Set.exe
windows7-x64
9Set.exe
windows10-2004-x64
9Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10enigma_ide64.dll
windows7-x64
1enigma_ide64.dll
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Set.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Set.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
enigma_ide64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
enigma_ide64.dll
Resource
win10v2004-20241007-en
General
-
Target
Set.exe
-
Size
2.0MB
-
MD5
57a124f28215ba2dfbe7b8d264b0741b
-
SHA1
285f1f0ede5561caba18c6d5f6b95efd7f652293
-
SHA256
683f4c758e2b8cfc95d9df625c17ece1d9c3fe4ab4fb33e8924d0bc8618eb6b7
-
SHA512
9f45535df4e00acb612f3d15be1d4082e1027d3cdb39a9547a2d8e8c86d2e8950a0285512eacbbd6ce73608ab3f28edbf0c90059a83497d3f392e457435a3557
-
SSDEEP
49152:ydhg+xjQ/7kYfR/JomNOpiTB7Pakt090tb64I4MO:ggMjK7Df1Jo4eiTtp0I6J4MO
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Set.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Set.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Set.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Set.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine Set.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 24 iplogger.org 25 iplogger.org 38 bitbucket.org 39 bitbucket.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 448 Set.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 448 Set.exe 448 Set.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set.exe"C:\Users\Admin\AppData\Local\Temp\Set.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD57bccda3f6217c7b932db6c0a10a1e4af
SHA1dc30f82ecae5a22aa8c61ded720c03821d71750b
SHA25616697459d9a66551b7f34545cdb7cd50c4eadde89f901f3d230ff1ab45efedfc
SHA5121de2bd7b84d18967ff26cc977930246a970d0b23d63a9de6b3f63c440a0969847a59eda4cd6eb894869d1b6ddc6333a96994f09abf4e59f397c553cfce2aa015