Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
14.4MB
-
MD5
db63171e8f58f0e78f588471154b3c27
-
SHA1
de940ecab24a000a64f27ca6b0fe93c7d5e9f866
-
SHA256
5451f776144a83c4fbf47d9dc455f4ba2751dc20a36b4022fadb9f5fdfad32ec
-
SHA512
1dc070e460628eab8b4efb40e1dd3cba77d8c05930fb970adb426812561e112c13b21cdbd00dc5b5b78657e160ac3a18b0ae6329f203f174a6fb4610133e024d
-
SSDEEP
196608:Ywa/A5/A3Pg2LkIJmgLpY/iLNooeoc+k88MkEQx4enDtJ+fmPOSAWiH5m+6h7MnC:qP1JtpQd8S+fiz+bC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ContaCam = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Setup.exe" Setup.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2580 2148 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Setup.exepid Process 2148 Setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Setup.exepid Process 2148 Setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Setup.exepid Process 2148 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Setup.exepid Process 2148 Setup.exe 2148 Setup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 2148 wrote to memory of 2580 2148 Setup.exe 31 PID 2148 wrote to memory of 2580 2148 Setup.exe 31 PID 2148 wrote to memory of 2580 2148 Setup.exe 31 PID 2148 wrote to memory of 2580 2148 Setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 5442⤵
- Program crash
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51c3866deb8e7789657f98840d623a169
SHA17411f3699a17972110bdf1b7ada91306d5beacc8
SHA256af47c75ed2571f28dba14f4bac724b0be1cf80a1b045e89169cc22948dbf8629
SHA512942e25cd3256269df1f75c2fba8d9e48c90962c2c6907f76a46f8e011ddfb5b579be71b32503e3f606032fc79f3287fdeb4897f76d3202562a2659834947adb3
-
Filesize
1KB
MD5f86f878b607a04416fdd964bdff2db40
SHA1c6cfc1fd00640e7713e8c6137e22e8764f64b5f2
SHA2569437f4144ece91feb09b16501f59d15b350e1a5e8046ffbb46a06d720d3676fc
SHA512f62e40d3bc4d9ebe018ec158a458696f7dc7c2be38469e98a6635ea59b914c62d48bea94eca1f060dd625131852e89df65a24bcf57235f94dc179ba8f6ee2b55
-
Filesize
58B
MD5f25df6b9843d84fbf75297bc055ae13d
SHA19ae6e0656337cae2204646f23721fe98d2b6ea87
SHA256f3d2384a7ae24486f1cf1cc5b36d9cbbaa6009d1a14edb9edd8afc2a83e9135f
SHA512895201ade52ab2571edbbbbab5b38bc45ad7689b36471db61930911a7b34bea3ffec346d109652c4ca4ec7bad533a2bd2da883f45ddb6ba31367f7b05ff84590