Overview
overview
10Static
static
10setup_inst...32.exe
windows7-x64
10setup_inst...32.exe
windows10-2004-x64
10setup_inst...2b.exe
windows7-x64
7setup_inst...2b.exe
windows10-2004-x64
7setup_inst...61.exe
windows7-x64
1setup_inst...61.exe
windows10-2004-x64
1setup_inst...f8.exe
windows7-x64
10setup_inst...f8.exe
windows10-2004-x64
10setup_inst...34.exe
windows7-x64
6setup_inst...34.exe
windows10-2004-x64
6setup_inst...c2.exe
windows7-x64
3setup_inst...c2.exe
windows10-2004-x64
7setup_inst...cb.exe
windows7-x64
10setup_inst...cb.exe
windows10-2004-x64
10setup_inst...90.exe
windows7-x64
6setup_inst...90.exe
windows10-2004-x64
6setup_inst...79.exe
windows7-x64
10setup_inst...79.exe
windows10-2004-x64
10setup_inst...d8.exe
windows7-x64
10setup_inst...d8.exe
windows10-2004-x64
10setup_inst...3b.exe
windows7-x64
7setup_inst...3b.exe
windows10-2004-x64
7setup_inst...ac.exe
windows7-x64
6setup_inst...ac.exe
windows10-2004-x64
6setup_inst...38.exe
windows7-x64
10setup_inst...38.exe
windows10-2004-x64
10setup_inst...b5.exe
windows7-x64
3setup_inst...b5.exe
windows10-2004-x64
3setup_inst...b2.exe
windows7-x64
6setup_inst...b2.exe
windows10-2004-x64
7setup_inst...rl.dll
windows7-x64
3setup_inst...rl.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 09:28
Behavioral task
behavioral1
Sample
setup_installer/Wed0901eb1dae126e32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup_installer/Wed0901eb1dae126e32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer/Wed094c47c32b.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
setup_installer/Wed094c47c32b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
setup_installer/Wed096a1bff61.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
setup_installer/Wed096a1bff61.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
setup_installer/Wed0971f17486f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
setup_installer/Wed0971f17486f8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup_installer/Wed09977fdc12334.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
setup_installer/Wed09977fdc12334.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setup_installer/Wed09abf83d9c2.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
setup_installer/Wed09abf83d9c2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
setup_installer/Wed09b2a8bc4f16cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
setup_installer/Wed09b2a8bc4f16cb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
setup_installer/Wed09b3a5ca1a712d390.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
setup_installer/Wed09b3a5ca1a712d390.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
setup_installer/Wed09c42cad92c20f79.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
setup_installer/Wed09c42cad92c20f79.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
setup_installer/Wed09cfb2f9758281d8.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
setup_installer/Wed09cfb2f9758281d8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
setup_installer/Wed09d27135e5a8b3b.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
setup_installer/Wed09d27135e5a8b3b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
setup_installer/Wed09d8d6edfaff2ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
setup_installer/Wed09d8d6edfaff2ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
setup_installer/Wed09db0d52c38.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
setup_installer/Wed09db0d52c38.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
setup_installer/Wed09e95ff6b5.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
setup_installer/Wed09e95ff6b5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
setup_installer/Wed09f257bb7877d00b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
setup_installer/Wed09f257bb7877d00b2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
setup_installer/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
setup_installer/libcurl.dll
Resource
win10v2004-20241007-en
General
-
Target
setup_installer/Wed09d27135e5a8b3b.exe
-
Size
379KB
-
MD5
9b07fc470646ce890bcb860a5fb55f13
-
SHA1
ef01d45abaf5060a0b32319e0509968f6be3082f
-
SHA256
506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
-
SHA512
4cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
SSDEEP
6144:6/QiQPMzDY39EiBeNyz9P8S9vkOQ/UBTlakaBdGOzGfnXpiQCsoazZPElpMQgqok:CQiGMwNEiBePS9v+MBTlPadSfXioRcpn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Wed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.tmppid process 2300 Wed09d27135e5a8b3b.tmp 988 Wed09d27135e5a8b3b.tmp -
Loads dropped DLL 8 IoCs
Processes:
Wed09d27135e5a8b3b.exeWed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.exeWed09d27135e5a8b3b.tmppid process 1244 Wed09d27135e5a8b3b.exe 2300 Wed09d27135e5a8b3b.tmp 2300 Wed09d27135e5a8b3b.tmp 2300 Wed09d27135e5a8b3b.tmp 2988 Wed09d27135e5a8b3b.exe 988 Wed09d27135e5a8b3b.tmp 988 Wed09d27135e5a8b3b.tmp 988 Wed09d27135e5a8b3b.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Wed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.exeWed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wed09d27135e5a8b3b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wed09d27135e5a8b3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wed09d27135e5a8b3b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wed09d27135e5a8b3b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Wed09d27135e5a8b3b.tmppid process 988 Wed09d27135e5a8b3b.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Wed09d27135e5a8b3b.exeWed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.exedescription pid process target process PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 1244 wrote to memory of 2300 1244 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2300 wrote to memory of 2988 2300 Wed09d27135e5a8b3b.tmp Wed09d27135e5a8b3b.exe PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp PID 2988 wrote to memory of 988 2988 Wed09d27135e5a8b3b.exe Wed09d27135e5a8b3b.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$4010A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$5010A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc