Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
1/Setup.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2/Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
1/Setup.exe
-
Size
14.4MB
-
MD5
db63171e8f58f0e78f588471154b3c27
-
SHA1
de940ecab24a000a64f27ca6b0fe93c7d5e9f866
-
SHA256
5451f776144a83c4fbf47d9dc455f4ba2751dc20a36b4022fadb9f5fdfad32ec
-
SHA512
1dc070e460628eab8b4efb40e1dd3cba77d8c05930fb970adb426812561e112c13b21cdbd00dc5b5b78657e160ac3a18b0ae6329f203f174a6fb4610133e024d
-
SSDEEP
196608:Ywa/A5/A3Pg2LkIJmgLpY/iLNooeoc+k88MkEQx4enDtJ+fmPOSAWiH5m+6h7MnC:qP1JtpQd8S+fiz+bC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ContaCam = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1\\Setup.exe" Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1036 set thread context of 2400 1036 Setup.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4988 2400 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1036 Setup.exe 1036 Setup.exe 2400 more.com 2400 more.com -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1036 Setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1036 Setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1036 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1036 Setup.exe 1036 Setup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2400 1036 Setup.exe 86 PID 1036 wrote to memory of 2400 1036 Setup.exe 86 PID 1036 wrote to memory of 2400 1036 Setup.exe 86 PID 1036 wrote to memory of 2400 1036 Setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\1\Setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 3563⤵
- Program crash
PID:4988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2400 -ip 24001⤵PID:720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d7387f5fc1836c33f0ab8a825172dae
SHA170a32d6d6784bae9bc9dbcbf20eb2b62846b816c
SHA2566dfbada95b9931e9053c1d3d230f05b5539f401a8dad56f96233c06713d6499f
SHA5128aed8992a2ce75aa0ebbf874a2b80b44326311bead221e22b86bfa2e83c87886eb325ce371dbba545c9bd843d3f8663eafa3eb979cc2100aa0db34956bef0eb1
-
Filesize
1KB
MD54e31656dd105113b1361fd30b5ec0f78
SHA18b0c7c784224e26c15400da6ab25a46d8e13222c
SHA2563c7f33a8fe67f56d06f9817bbb397ea838d26eb64958d47f6226e1c42a67083b
SHA51211a838b1fa4e2fc5ca1636481fdcd9315b2c388a744f621af15bdfc76184aa88d93f91e52d55e885309e3ce5a7a6857cee58c8546b4bf396fec260cbdb369bdb
-
Filesize
58B
MD5f25df6b9843d84fbf75297bc055ae13d
SHA19ae6e0656337cae2204646f23721fe98d2b6ea87
SHA256f3d2384a7ae24486f1cf1cc5b36d9cbbaa6009d1a14edb9edd8afc2a83e9135f
SHA512895201ade52ab2571edbbbbab5b38bc45ad7689b36471db61930911a7b34bea3ffec346d109652c4ca4ec7bad533a2bd2da883f45ddb6ba31367f7b05ff84590
-
Filesize
610B
MD5604f1439f0d9e99913853924127d8d37
SHA1f64a18c858b5669943f3022383ec52d18eb8dd48
SHA256b1a8b6988b711cfc88eb9fec41f73b15e6430535e808302c9bfa1d0beb802a7d
SHA512e1d102647cded07bea94a0f710b2d8752b48e6facf237fc75f6a82694a580c8c905ebbd135b9218ed2366000ae89244c5dbd8e72ab15d2265a7fec542d403f4b
-
Filesize
1.2MB
MD51c3866deb8e7789657f98840d623a169
SHA17411f3699a17972110bdf1b7ada91306d5beacc8
SHA256af47c75ed2571f28dba14f4bac724b0be1cf80a1b045e89169cc22948dbf8629
SHA512942e25cd3256269df1f75c2fba8d9e48c90962c2c6907f76a46f8e011ddfb5b579be71b32503e3f606032fc79f3287fdeb4897f76d3202562a2659834947adb3
-
Filesize
1.0MB
MD5fa0fb066d1cd2ba0dd4ff31df0cb3e7f
SHA18d3a359fee284b1c15d8b79264276568fd97f16f
SHA256840f8fad9de85fca3074ed56c2db64999a6004df18ad13caeac38f463456dea7
SHA5121ee0aeda62f348889c851ea89827173ccb9631fafb13a95fc1a423e7cf575d52b4124553893b866be9fda983abf30f1ff7df5751763e1f8ccd560eb96006333b