Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
ActSet.exe
Resource
win7-20240903-en
General
-
Target
ActSet.exe
-
Size
650.0MB
-
MD5
5d154e54427fc951508fcb8225260eeb
-
SHA1
02ef7db12f07ac919823a765c35bef0a0ac777cb
-
SHA256
62c435de1dd3657a0d2203948aa79de68432ee59b632574f571211acf3520b37
-
SHA512
211a11b84aa9e64e3ea25782c4b4eb0ce48842b98262c03be1b2de705386e04e02b49ba61680e624a0216cd863cef48f3793c301825f29cb9260eeafb454ed87
-
SSDEEP
49152:CeNzxKvAI/KnCAjFN2DOjwJHJdVLD4+04p+cn0Jmc9gqSsOp4MQ+FnFrMR5:DCA34pfBGgqSsOV
Malware Config
Signatures
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
ActSet.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools ActSet.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ActSet.exedescription ioc process File opened (read-only) \??\D: ActSet.exe File opened (read-only) \??\F: ActSet.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 ipinfo.io 31 ipinfo.io 44 ipinfo.io -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
ActSet.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN ActSet.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ActSet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActSet.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
ActSet.exepid process 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe 3604 ActSet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ActSet.exe"C:\Users\Admin\AppData\Local\Temp\ActSet.exe"1⤵
- Looks for VMWare Tools registry key
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3604
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1