Overview
overview
6Static
static
3Data/Updater.exe
windows10-ltsc 2021-x64
1Data/d3dco...47.dll
windows10-ltsc 2021-x64
1Data/devto...ces.js
windows10-ltsc 2021-x64
3Data/en-US...cy.xml
windows10-ltsc 2021-x64
3Data/en-US...ls.xml
windows10-ltsc 2021-x64
3Data/ffmpeg.dll
windows10-ltsc 2021-x64
1Data/icudtl.dat
windows10-ltsc 2021-x64
3Data/v8_co...ot.bin
windows10-ltsc 2021-x64
3NAudio.dll
windows10-ltsc 2021-x64
1QtCore4.dll
windows10-ltsc 2021-x64
3QtGui4.dll
windows10-ltsc 2021-x64
3QtNetwork4.dll
windows10-ltsc 2021-x64
3QtXml4.dll
windows10-ltsc 2021-x64
3RcClientBase.dll
windows10-ltsc 2021-x64
3Resource.exe
windows10-ltsc 2021-x64
Set-up.exe
windows10-ltsc 2021-x64
6StarBurn.dll
windows10-ltsc 2021-x64
3UpdateClient.dll
windows10-ltsc 2021-x64
3UpdateCommon.dll
windows10-ltsc 2021-x64
3msvcp100.dll
windows10-ltsc 2021-x64
3msvcr100.dll
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
96s -
max time network
136s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
Data/Updater.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Data/d3dcompiler_47.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Data/devtools_resources.js
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Data/en-US/PowerShellExecutionPolicy.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
Data/en-US/Shell-CommandPrompt-RegEditTools.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
Data/ffmpeg.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
Data/icudtl.dat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
Data/v8_context_snapshot.bin
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
NAudio.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
QtCore4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
QtGui4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
QtNetwork4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
QtXml4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
RcClientBase.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
Resource.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
Set-up.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
StarBurn.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
UpdateClient.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
UpdateCommon.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
msvcp100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
msvcr100.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
Set-up.exe
-
Size
6.2MB
-
MD5
11c8962675b6d535c018a63be0821e4c
-
SHA1
a150fa871e10919a1d626ffe37b1a400142f452b
-
SHA256
421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273
-
SHA512
3973c23fc652e82f2415ff81f2756b55e46c6807cc4a8c37e5e31009cec45ab47c5d4228c03b5e3a972cacd6547cf0d3273965f263b1b2d608af89f5be6e459a
-
SSDEEP
98304:u4bRxuHuFP2rHLpHPA477yNRgoPbfnRROWR721LYfs17u0kcFrXLEJfwY:u4NxuOFI1AEyrbf/52BYfs1LkcFrXL+X
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid Process 18 112 msiexec.exe 22 112 msiexec.exe 24 112 msiexec.exe 28 112 msiexec.exe 32 112 msiexec.exe 36 112 msiexec.exe 38 112 msiexec.exe 41 112 msiexec.exe 44 112 msiexec.exe 47 112 msiexec.exe 49 112 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Set-up.exedescription pid Process procid_target PID 3824 set thread context of 1076 3824 Set-up.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Set-up.exemore.commsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Set-up.exemore.compid Process 3824 Set-up.exe 3824 Set-up.exe 1076 more.com 1076 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Set-up.exemore.compid Process 3824 Set-up.exe 1076 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Set-up.exemore.comdescription pid Process procid_target PID 3824 wrote to memory of 1076 3824 Set-up.exe 79 PID 3824 wrote to memory of 1076 3824 Set-up.exe 79 PID 3824 wrote to memory of 1076 3824 Set-up.exe 79 PID 3824 wrote to memory of 1076 3824 Set-up.exe 79 PID 1076 wrote to memory of 112 1076 more.com 86 PID 1076 wrote to memory of 112 1076 more.com 86 PID 1076 wrote to memory of 112 1076 more.com 86 PID 1076 wrote to memory of 112 1076 more.com 86 PID 1076 wrote to memory of 112 1076 more.com 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c202d3fb2c6ed27af422666ada171402
SHA177b819ce4035bbd052bcfadc72520dd780c016a6
SHA2562dd1397b9182cc09c32c533cbe3e3f2773ff80483f52bb6a53691badec47c2e8
SHA512e0cc272bf606034513ca45cdc3e8cc9c342f638fc0a37adccaf15c786d9db8fc5f35459cb2a79de74973489dc1cfbb8d0b0639df61e9ac23a05f26de06fb59ce