Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 12:27

General

  • Target

    1/Setup.exe

  • Size

    14.4MB

  • MD5

    db63171e8f58f0e78f588471154b3c27

  • SHA1

    de940ecab24a000a64f27ca6b0fe93c7d5e9f866

  • SHA256

    5451f776144a83c4fbf47d9dc455f4ba2751dc20a36b4022fadb9f5fdfad32ec

  • SHA512

    1dc070e460628eab8b4efb40e1dd3cba77d8c05930fb970adb426812561e112c13b21cdbd00dc5b5b78657e160ac3a18b0ae6329f203f174a6fb4610133e024d

  • SSDEEP

    196608:Ywa/A5/A3Pg2LkIJmgLpY/iLNooeoc+k88MkEQx4enDtJ+fmPOSAWiH5m+6h7MnC:qP1JtpQd8S+fiz+bC

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\1\Setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2400
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\SysWOW64\msiexec.exe
        3⤵
          PID:2952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 356
          3⤵
          • Program crash
          PID:4988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2400 -ip 2400
      1⤵
        PID:720

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1\Setup.ini

        Filesize

        1KB

        MD5

        1d7387f5fc1836c33f0ab8a825172dae

        SHA1

        70a32d6d6784bae9bc9dbcbf20eb2b62846b816c

        SHA256

        6dfbada95b9931e9053c1d3d230f05b5539f401a8dad56f96233c06713d6499f

        SHA512

        8aed8992a2ce75aa0ebbf874a2b80b44326311bead221e22b86bfa2e83c87886eb325ce371dbba545c9bd843d3f8663eafa3eb979cc2100aa0db34956bef0eb1

      • C:\Users\Admin\AppData\Local\Temp\1\Setup.ini

        Filesize

        1KB

        MD5

        4e31656dd105113b1361fd30b5ec0f78

        SHA1

        8b0c7c784224e26c15400da6ab25a46d8e13222c

        SHA256

        3c7f33a8fe67f56d06f9817bbb397ea838d26eb64958d47f6226e1c42a67083b

        SHA512

        11a838b1fa4e2fc5ca1636481fdcd9315b2c388a744f621af15bdfc76184aa88d93f91e52d55e885309e3ce5a7a6857cee58c8546b4bf396fec260cbdb369bdb

      • C:\Users\Admin\AppData\Local\Temp\1\Setup.ini

        Filesize

        58B

        MD5

        f25df6b9843d84fbf75297bc055ae13d

        SHA1

        9ae6e0656337cae2204646f23721fe98d2b6ea87

        SHA256

        f3d2384a7ae24486f1cf1cc5b36d9cbbaa6009d1a14edb9edd8afc2a83e9135f

        SHA512

        895201ade52ab2571edbbbbab5b38bc45ad7689b36471db61930911a7b34bea3ffec346d109652c4ca4ec7bad533a2bd2da883f45ddb6ba31367f7b05ff84590

      • C:\Users\Admin\AppData\Local\Temp\1\Setup.ini

        Filesize

        610B

        MD5

        604f1439f0d9e99913853924127d8d37

        SHA1

        f64a18c858b5669943f3022383ec52d18eb8dd48

        SHA256

        b1a8b6988b711cfc88eb9fec41f73b15e6430535e808302c9bfa1d0beb802a7d

        SHA512

        e1d102647cded07bea94a0f710b2d8752b48e6facf237fc75f6a82694a580c8c905ebbd135b9218ed2366000ae89244c5dbd8e72ab15d2265a7fec542d403f4b

      • C:\Users\Admin\AppData\Local\Temp\1a773b3f

        Filesize

        1.2MB

        MD5

        1c3866deb8e7789657f98840d623a169

        SHA1

        7411f3699a17972110bdf1b7ada91306d5beacc8

        SHA256

        af47c75ed2571f28dba14f4bac724b0be1cf80a1b045e89169cc22948dbf8629

        SHA512

        942e25cd3256269df1f75c2fba8d9e48c90962c2c6907f76a46f8e011ddfb5b579be71b32503e3f606032fc79f3287fdeb4897f76d3202562a2659834947adb3

      • C:\Users\Admin\AppData\Local\Temp\1fee6ca7

        Filesize

        1.0MB

        MD5

        fa0fb066d1cd2ba0dd4ff31df0cb3e7f

        SHA1

        8d3a359fee284b1c15d8b79264276568fd97f16f

        SHA256

        840f8fad9de85fca3074ed56c2db64999a6004df18ad13caeac38f463456dea7

        SHA512

        1ee0aeda62f348889c851ea89827173ccb9631fafb13a95fc1a423e7cf575d52b4124553893b866be9fda983abf30f1ff7df5751763e1f8ccd560eb96006333b

      • memory/1036-208-0x0000000000990000-0x0000000001B62000-memory.dmp

        Filesize

        17.8MB

      • memory/1036-215-0x00007FFA13F70000-0x00007FFA14165000-memory.dmp

        Filesize

        2.0MB

      • memory/1036-216-0x00000000773B3000-0x00000000773B5000-memory.dmp

        Filesize

        8KB

      • memory/1036-217-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/1036-218-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/1036-214-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/2400-220-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/2400-222-0x00007FFA13F70000-0x00007FFA14165000-memory.dmp

        Filesize

        2.0MB

      • memory/2400-223-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/2400-224-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB

      • memory/2400-225-0x00000000773A0000-0x0000000077953000-memory.dmp

        Filesize

        5.7MB