Analysis
-
max time kernel
74s -
max time network
104s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-11-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts/CSP_220w_setup.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts/Crack/CLIPStudioPaint.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts/Crack/INSTRUCTION (read me first).txt
Resource
win10ltsc2021-20241023-en
General
-
Target
Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts/CSP_220w_setup.exe
-
Size
425.8MB
-
MD5
b56f7447f44ce9506b1c3aa651e90e47
-
SHA1
1cb4f7fb72f0135ede9a8b319b45d666a8b85240
-
SHA256
ac01cc74d1a330ac2d46b913089888499db5cddb943e34eb6e367d8912c22c4a
-
SHA512
cbb2833c529a8c85b013831fb2f3cbc39a1d5d5bee86e17b8bce593dd5649ac357854c7a84ebcc9343b47e1e2ab3370d3a33545ab3ad14fd546db3263f441efa
-
SSDEEP
12582912:aZEt3yNO/oh0QEzR8V+024pDJwDF/tkrbKQh2d38xh:aZEENO/c0BK84ptwF/qrI36
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 7 IoCs
Processes:
CSP_220w_setup.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exepid process 1744 CSP_220w_setup.exe 3448 ISBEW64.exe 3368 ISBEW64.exe 2624 ISBEW64.exe 1544 ISBEW64.exe 4160 ISBEW64.exe 1572 ISBEW64.exe -
Loads dropped DLL 9 IoCs
Processes:
CSP_220w_setup.exepid process 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CSP_220w_setup.exeCSP_220w_setup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSP_220w_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSP_220w_setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
CSP_220w_setup.exepid process 1744 CSP_220w_setup.exe 1744 CSP_220w_setup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
CSP_220w_setup.exeCSP_220w_setup.exedescription pid process target process PID 892 wrote to memory of 1744 892 CSP_220w_setup.exe CSP_220w_setup.exe PID 892 wrote to memory of 1744 892 CSP_220w_setup.exe CSP_220w_setup.exe PID 892 wrote to memory of 1744 892 CSP_220w_setup.exe CSP_220w_setup.exe PID 1744 wrote to memory of 3448 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 3448 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 3368 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 3368 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 2624 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 2624 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 1544 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 1544 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 4160 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 4160 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 1572 1744 CSP_220w_setup.exe ISBEW64.exe PID 1744 wrote to memory of 1572 1744 CSP_220w_setup.exe ISBEW64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts\CSP_220w_setup.exe"C:\Users\Admin\AppData\Local\Temp\Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts\CSP_220w_setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\{3493C921-B8A2-42FC-8D96-3596374A8A85}\CSP_220w_setup.exeC:\Users\Admin\AppData\Local\Temp\{3493C921-B8A2-42FC-8D96-3596374A8A85}\CSP_220w_setup.exe -package:"C:\Users\Admin\AppData\Local\Temp\Clip Studio Paint EX 2.2.0 (x64) Multilingual By GetPCSofts\CSP_220w_setup.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\{3493C921-B8A2-42FC-8D96-3596374A8A85}\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{3493C921-B8A2-42FC-8D96-3596374A8A85}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\{3493C921-B8A2-42FC-8D96-3596374A8A85}\Disk1\CSP_220w_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96513A14-EE62-40E0-B346-66CFF9837939}3⤵
- Executes dropped EXE
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1081A4A8-1199-4A21-97C3-3BDCCE2CF7BB}3⤵
- Executes dropped EXE
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7B2D59D4-1677-4029-9ED2-C07CC78F9D92}3⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E4E147E1-CB11-4962-994A-C786355A78DB}3⤵
- Executes dropped EXE
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{84C8CBC7-8211-479C-99C2-D9BEE79F3AA2}3⤵
- Executes dropped EXE
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7DA28EE0-1823-4ABE-8D60-E60B6DFDE8EA}3⤵
- Executes dropped EXE
PID:1572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5cb279e894409aef5f9410d7d8d113c54
SHA1300c199084e171880bb206a5f5c11c7a5b15744f
SHA256e984815636a4f457069b13e5d2ab02ddbbc692e26dedba4d74bb9c9172a89232
SHA512a58962ee7d9499da216c1f6d93ce27ae4b759ca605469fd19ae48ae926cda909d5d3762345f7304132d9c1eb3407797bb21498dc2bc10b0eb6fee5a87657126b
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\DIFxData.ini
Filesize84B
MD51eb6253dee328c2063ca12cf657be560
SHA146e01bcbb287873cf59c57b616189505d2bb1607
SHA2566bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1
SHA5127c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\FontData.ini
Filesize37B
MD58ce28395a49eb4ada962f828eca2f130
SHA1270730e2969b8b03db2a08ba93dfe60cbfb36c5f
SHA256a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932
SHA512bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\InstallshieldSupportModule.dll
Filesize184KB
MD5a65d3f22e82802871d3f698fc1016f21
SHA1dc17fe50a1b1821f5f251114897faeb889457398
SHA2562a27b247c1387082036bcd83fb20dbef9d923b0ffa56573c093d0b71edf6d57b
SHA51208054d4ccbf3c1f6c40e338c273908ac3250a23399328ed645a7bfd79fa28293db59718d8114316a2263345347d03f772b390980c24ef78acced69d92030a968
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\_isres_0x0409.dll
Filesize1.8MB
MD547883e42b1859329eba55075290a2c5a
SHA17cd7c1a82aa8a74db7926129e3844cefdf79376b
SHA256ead0b66d81c87d26cf530ec5833d04d11782aa01adc9420ad939f492e2ce016c
SHA512adc92de860d2f09013ce03a13af941e38ba569e89b53cedfb7fb25abe3d3654c173e70cc86407646df13cb7da14557e788ea2d2ce6370c01f885d73e6115048c
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\_isuser_0x0409.dll
Filesize356KB
MD5ddd6f47821c6adbe37acb27b77768e78
SHA17f5b22f12568b288ac7077e978b14365c6c74ce5
SHA2569fe22214f7b43db531ff64e431fbbac3080e2a0e756ff7dfa8a9b67061cac388
SHA512f03844afa07fa46079272842da2822f88431b6c8ccd54e691e90c69b62b7c73f2d27cef1b724b3aa64351ae70c78decb381f1f8b4af564b4bd246a9a94b3ec85
-
C:\Users\Admin\AppData\Local\Temp\{2321A0DA-9707-4615-8B9C-4AEA2D2E17A8}\{1E4572D2-28BC-4BC9-B743-13DC6CFD71DB}\isrt.dll
Filesize430KB
MD5e9208322f81fc26beaaa5a73cafda4a2
SHA111863afbef0456bf0e8c8bfab1cffad0356f80cb
SHA2560fe47b313616738f2d0864d17d4c7ba1fd0778c8f95d741989d597fe23d6cc7c
SHA512a32193f7ba02faa959de9949c332c716949af674b353a43e1dce846747492eaa818963c28afcaf837e757f93aa98a7f244177a5afd204ad6b54d6006e522ec68
-
Filesize
10KB
MD5cd658d92df1ad180483136cd6960e7f6
SHA10d2808f19c659312372386276bb8dec386b2b638
SHA2565d31e009a36325032ab1521d2b1ca1a5be89bb969d1948d4fe99c387b1055db1
SHA51284540ddb853c9dcf49c2abe931601884f744c341d33f2f615f9d3290c41ead9d0709e0882358d5326b87fa25adf61ea1ff7a2b9bad52bfaab18b31d08047da31
-
Filesize
25KB
MD51f71deaf7e3c298f4c4112db5e7ac029
SHA12d653e79c55e31cd00af51313a7b07aed123ab04
SHA256b4d2bf8ddeee1e2acc5dfaa14ac602a69f52195c38eab4660408fd879ad41a56
SHA512e0c0fe70904f768ebd191cd8aae285a7e851ff5e5ee3cbe5b78a708b6f378db33f499291eb89ee268fd3b3a694abaf6826162571aba74a6837f65c95a8078666
-
Filesize
22KB
MD51196f20ca8bcaa637625e6a061d74c9e
SHA1d0946b58676c9c6e57645dbcffc92c61eca3b274
SHA256cdb316d7f9aa2d854eb28f7a333426a55cc65fa7d31b0bdf8ae108e611583d29
SHA51275e0b3b98ad8269dc8f7048537ad2b458fa8b1dc54cf39df015306abd6701aa8357e08c7d1416d80150ccfd591376ba803249197abdf726e75d50f79d7370ef3
-
Filesize
25KB
MD5b216bc7b827622578e60b0b37ce9c4c0
SHA118eb706aa172440c783382fb317dcb2ef7d04e2a
SHA2564e42d96cf24224d3ed43e7e14227b96fde3b43235636480f8861db0b048ffddf
SHA512e4211ee47bccf98369b7760502cc04e7c036e7ee8eb8a29143519c35cf5295f9984ee8de1fc8d7e93352119f9cf5fcb3412b7e3749b1540fd38af7d996ab0700
-
Filesize
26KB
MD59a10eddf9169f9508688eace7b9e7797
SHA1fe256fc1dd6a26478a7d06712d789d3f0db431d5
SHA256d31b120f79c2fb8cd6f3fd7ede220a30ca3bb84e4d3c8b05c1bcc833734d13cf
SHA512c3d5534e5edd819c03198ec19ab17bd90f29b33bd2f35a7f26e09ec4d59750065c4c3820efa2b6c8862e2fc00a0cf64fa928abeb62a3688b399eeb275de3ae5d
-
Filesize
14KB
MD5b807ce7552e96dc1928775956b9f422c
SHA1d25122157365130bebae6497617d28cd86e8c638
SHA2563f0778538202a35483c084fb0b109f693a9853f64d6452daa5c92ac75620aadc
SHA512bb06ca5784e77ceb15331c5c6a9abad27364b1c5b800f229cd7b6d955fb120cbd7879c299508b606760f714b17a4a50aba333ccf6da7fb9bcd88b50772f64f6d
-
Filesize
14KB
MD559b2e4a2d3898f3e4f49186ff150e26c
SHA142f49643ef257d3ba2817af5731a165b42c42bfd
SHA2569416c7b55d1fd9dc06f20e1e3ebbac1357217113833553d49586e339360529c7
SHA512e6601b583567291088f1c522adf38dbc3408855463429354c7ceee2a46459c76daffc3db1f770e4979a59b88cea43599f88eb9b4dd170cf337008039775dff62
-
Filesize
23KB
MD5eb6dae1391cac22014afd6ccf4c2c333
SHA10476104dff6077de57ed24d43b2d4f8a74b6ad3e
SHA256af54db26c9464b7a610d7eb73f06f36b43ac51e879ac4d21a1c70eb4524a2b24
SHA512d40a5478056ff3a59e06dc779166baf144eb0db33819180fc6ac47808f49a2249158d8e5cf106c654ce42ab71b6f6f16c3b9777a6b445b1297f741affe09f587
-
Filesize
22KB
MD5733f697e11797f50f950b08701a0c1ec
SHA1e24d6f9064dfa404739485647a5bd8c6b7165579
SHA256372dc097b80442810781d777cdd23296a0558be58b3418f4ea088cbcd7f661b2
SHA512edba839537d63713d6dd708384296d4b6d995dacd9d01813063810e230deafc166baddb2c987442f7985b01a283454a7f5fa4076ebc276fca03c95d175091fc7
-
Filesize
24KB
MD594afe5b2ac909992f6b7e3c629815d7d
SHA1f6cea0560818c77d9de5447cc0d5e24da12e52bf
SHA256af34e34cb979dae26a2ed08673e0ea20fcdb5d1f7ee9acf42f93afe16a64521c
SHA5125acb1c761a392b96588c5c223e25497a80a7ac7cf8d80e5efb55bdb225544e8adbaafd1ae1f51bc076a29e7d7bf229ac57c8728b969f68b15678f1ccf8445826
-
Filesize
945KB
MD51f98958e864a44045d17ea99badbda48
SHA122632f2dbad629637882cbac20d7b9815f97b493
SHA25669362f882dc64541f72d889f62822d99e94c0a33ef7c6e443bf33159f2f000af
SHA512238f452d63a377764e3405626f336e738a20e439d7e021fb32420f15a593af694fedf7cf705d912a715fd48c3c92d217f8812ed4c87809e8b3bc3c4bace8ab63
-
Filesize
1.6MB
MD5356e6d761016df2373a4b35c3eb0b445
SHA18664204ca0aad44f5273a6451763f78e6514dd65
SHA2561d40e68e4c952db31bfbf340480d7ae5ee2f37f182a2e11258d0542bb75768e0
SHA512439899eba97646896448a1b74c437a1419fe445f71ee36998e51b249de62304b0d202d0ee6e5b99524cd7b705c58210bc9e243d6268e4509a3f2ee15164db181
-
Filesize
521KB
MD52613f42d6d6b33bd66914edf7afebd14
SHA13b433d2d72ee3048948db5bd57c8c1ee8d6d1fcb
SHA2562b0ab3d8231eb0173bb5a737fcc4af5546de12a7b08dca6f3b654dc922a7d103
SHA512c148ca25dea418eb152457fd37dcccf89ecb423cbfd9e17e9cf8d8a537a20700f79d0dd3fed3c3f1d1aab0f10c78428ed18e3706719ff066f9355eb44a5d2f29
-
Filesize
848B
MD5a60e895ab88f4b33ac8f46031f083956
SHA1e61ca5e47972f6f5ba83283160f973a1203a5c72
SHA256988a9d22c777be27145f839f6f51a204a731f25ba12d188eb7468a372bd8ecb9
SHA512d8fba721a364c5bbfea93cc88dbdacaf80af573558d9d704147b55026389a1cfbf6f1aea2cf1b4520ce59e29de0ffee05a9c71a89375e3a7a8c516c2df7c84ba
-
Filesize
263KB
MD5b8cfa9610ca6b8498814f7c5d3d3ff29
SHA1ecb355b8110850359e789b01276c67868a6fdb74
SHA2567ed6ee16411c860855b5ef8e6672f8cbe68b04f4c844924c1f675bb2873c2341
SHA5129e7ad885e444b7f9218ff96e32eae3d613c8a341e66d24a01fede972554c51ee736610937b534acef854c1aaa33a53966fddc3035cdaa46524f7ae4c62ac5c4d
-
Filesize
2KB
MD5fc8a0ac43218330f118424a64f5f0cd0
SHA136ec4fb5f86e521ad67519f2eb6195981ab4ac5d
SHA256ea239b8e11fd28a85387e9b7a5324a60fd29fdbf113aa9f89f62096b6bef101e
SHA512fb6d3aca0781e3c9c2a174abd9f4ba6de2536cff28fc3905c3cb9f19a9d5ff637066acbd19560579b1d73f43b92b0cb695f81d3f0853e3548759f539d67108b5