Overview
overview
10Static
static
106c5db6dce1...3e.exe
windows7-x64
106c5db6dce1...3e.exe
windows10-2004-x64
10DusBrowserInst.exe
windows7-x64
6DusBrowserInst.exe
windows10-2004-x64
6IDWCH2.exe
windows7-x64
7IDWCH2.exe
windows10-2004-x64
7Litever01.exe
windows7-x64
10Litever01.exe
windows10-2004-x64
10NAN.exe
windows7-x64
10NAN.exe
windows10-2004-x64
10anyname.exe
windows7-x64
3anyname.exe
windows10-2004-x64
3app.exe
windows7-x64
10app.exe
windows10-2004-x64
10askinstall50.exe
windows7-x64
10askinstall50.exe
windows10-2004-x64
10farlab_setup.exe
windows7-x64
7farlab_setup.exe
windows10-2004-x64
7inst002.exe
windows7-x64
10inst002.exe
windows10-2004-x64
10jamesnew.exe
windows7-x64
3jamesnew.exe
windows10-2004-x64
3justdezine.exe
windows7-x64
10justdezine.exe
windows10-2004-x64
10md3_3kvm.exe
windows7-x64
10md3_3kvm.exe
windows10-2004-x64
10mixseven.exe
windows7-x64
10mixseven.exe
windows10-2004-x64
10redcloud.exe
windows7-x64
10redcloud.exe
windows10-2004-x64
10udptest.exe
windows7-x64
10udptest.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 01:40
Behavioral task
behavioral1
Sample
6c5db6dce13ded4e0e6c7e9a526b063e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6c5db6dce13ded4e0e6c7e9a526b063e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DusBrowserInst.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
DusBrowserInst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
IDWCH2.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
IDWCH2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Litever01.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Litever01.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
NAN.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
NAN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
anyname.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
anyname.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
app.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
app.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
askinstall50.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
askinstall50.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
farlab_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
farlab_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
inst002.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
inst002.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
jamesnew.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
jamesnew.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
justdezine.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
justdezine.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
md3_3kvm.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
md3_3kvm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
mixseven.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
mixseven.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
redcloud.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
redcloud.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
udptest.exe
Resource
win7-20240903-en
General
-
Target
farlab_setup.exe
-
Size
1.7MB
-
MD5
a7703240793e447ec11f535e808d2096
-
SHA1
913af985f540dab68be0cdf999f6d7cb52d5be96
-
SHA256
6a17ebf5da6aa3a1f4813e5f46fdd5d19d026bcfac91f232359f98e43df3c38f
-
SHA512
57bdcdfcfa11f6b5bf4149be0fee0444fcf67ccececf1009b166b17b7dce30da1a472f1890736186f4ef76e02ed23cc0dd2a41dc9bff94218a059832d4b5c69e
-
SSDEEP
49152:C9CKxz5eM8JvooqXrFzYA8hVU2AGm63yjpGIcLJjmyGpf8:MCm5eMOooqhomhjrcLS8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2160 farlab_setup.tmp 580 farlab_setup.tmp -
Loads dropped DLL 8 IoCs
pid Process 1480 farlab_setup.exe 2160 farlab_setup.tmp 2160 farlab_setup.tmp 2160 farlab_setup.tmp 1804 farlab_setup.exe 580 farlab_setup.tmp 580 farlab_setup.tmp 580 farlab_setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language farlab_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language farlab_setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language farlab_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language farlab_setup.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 580 farlab_setup.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 1480 wrote to memory of 2160 1480 farlab_setup.exe 30 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 2160 wrote to memory of 1804 2160 farlab_setup.tmp 31 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32 PID 1804 wrote to memory of 580 1804 farlab_setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\is-EQ593.tmp\farlab_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-EQ593.tmp\farlab_setup.tmp" /SL5="$400E0,1570064,56832,C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe"C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe" /SILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\is-JSOAD.tmp\farlab_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JSOAD.tmp\farlab_setup.tmp" /SL5="$500E0,1570064,56832,C:\Users\Admin\AppData\Local\Temp\farlab_setup.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc