Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 00:09

General

  • Target

    SnSetup1.7.exe

  • Size

    601KB

  • MD5

    bfe8e9072c8e530229f4984f4e64c534

  • SHA1

    cf95d3be5395744e696d9cf0484915d185a3eaab

  • SHA256

    91f02fafb1a3ab7a20761d308d7a1f224e889cb0bc43daadf9d9cb5d5c6e65e3

  • SHA512

    a83b872c670c54839842f0e246e8a6739f8b5aab8a23e2678c999e891a8caf21fec7a4ad84e7691dbd0072db01215e88b120be526adf5bc8ea01130d757adf84

  • SSDEEP

    12288:0zWyF45rsw9308qtvMwiM4HZS/dfLhaIGn0uERTtIiaO+tP/etJz:0zWyF4qQk8qh4M4Hk99aI1ttIiaOG/eX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SnSetup1.7.exe
    "C:\Users\Admin\AppData\Local\Temp\SnSetup1.7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files (x86)\SUDT\SUDT SerialNull\Install.exe
      "C:\Program Files (x86)\SUDT\SUDT SerialNull\Install.exe" -u
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Program Files (x86)\SUDT\SUDT SerialNull\Install.exe
      "C:\Program Files (x86)\SUDT\SUDT SerialNull\Install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1880
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7cd529da-555f-31a1-cc77-832d70373975}\snbus.inf" "9" "6c49640e7" "0000000000000570" "WinSta0\Default" "00000000000005AC" "208" "C:\Program Files (x86)\SUDT\SUDT SerialNull"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{55b21c07-c5dd-1f77-d0ab-b36d2979e83c} Global\{0fb3b0e3-ce41-233c-c3f6-b67414eb5d49} C:\Windows\System32\DriverStore\Temp\{6d1d6cee-18a9-23f5-c7f8-3c358080a000}\snbus.inf
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3068
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{35e40b2e-d2fe-5c9e-84fe-e04c9906e56d}\snserial.inf" "9" "649a1470b" "00000000000005AC" "WinSta0\Default" "0000000000000320" "208" "C:\Program Files (x86)\SUDT\SUDT SerialNull"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{7b1592b0-1bc6-3c1f-f2c2-8c6b61b77448} Global\{48976aa9-6653-1e3a-4826-3434cd244e11} C:\Windows\System32\DriverStore\Temp\{58dfabe5-62b0-211e-4310-3e3d2acacb46}\snserial.inf
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2764
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{471745f5-9260-4688-2cc5-4069f742cb3a}\snbus.inf" "9" "6c49640e7" "0000000000000320" "WinSta0\Default" "000000000000055C" "208" "C:\Program Files (x86)\SUDT\SUDT SerialNull"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{2e777d02-3af9-4f3a-950d-6c536af4db40} Global\{16615ac8-d2dd-326c-cb4f-8a66dc5c071a} C:\Windows\System32\DriverStore\Temp\{15afac35-5ac8-1661-3a53-253b54e93653}\snbus.inf
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2908
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{18ab5816-6acb-078a-1570-943f8ff0f64b}\snserial.inf" "9" "649a1470b" "000000000000055C" "WinSta0\Default" "0000000000000570" "208" "C:\Program Files (x86)\SUDT\SUDT SerialNull"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{39082f18-7636-2896-6378-825d5370bf02} Global\{2bf52721-4f68-004a-ecf2-cb39f31cbe1e} C:\Windows\System32\DriverStore\Temp\{5e6da0ba-3426-5611-4ece-fb6bed48f646}\snserial.inf
      2⤵
        PID:2212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\SUDT\SUDT SerialNull\snbus.inf

      Filesize

      1KB

      MD5

      96d0078ea02ed681f67d8c8e6409473c

      SHA1

      a45fad9dc80b4e74b0ec31af2187b0e4b6cfee3b

      SHA256

      3804a768e956d3f30666258972b3215b738fdd58383b8ea808d31042f4fda439

      SHA512

      e53e058248544cdbcf219130ba4ec3dce6e6885745064e8da52174490b348952b72addb7bc45625d73521fea7c290f1698adc1efeada744a8eda08f7008247b3

    • C:\Program Files (x86)\SUDT\SUDT SerialNull\snserial.inf

      Filesize

      1KB

      MD5

      c2aeabdadd719d5ff4097c4fe2995af7

      SHA1

      39cca12c94d4ba8aa41a6560a00b031de6899606

      SHA256

      392e836b5a9cdbba0f9b4eb8346a6c0281c134c070a40d99a2c71ad0d2362520

      SHA512

      7854dce413a860dde871d143480fc21ddbd2441516d9a913f568883aec726f0d45d5385dc2ac9fdf449babef2c72715378d683b097f869fd4f6ec6fe54281d38

    • C:\Users\Admin\AppData\Local\Temp\DMI753F.tmp.log.xml

      Filesize

      2KB

      MD5

      8785433e67e2bf36a62a4baf3ba85524

      SHA1

      ec9e1db622c02db3fa049032226bb089f5915912

      SHA256

      a671779765423d603cfe0dad9a88ae7c294ac657c7e7ad6b9723c58163fb541c

      SHA512

      487d383fa443ad325946082e6fc5c70726b20793047f6fd7bc2c34d5ff81697663cea2394ba129d9c151c026b03e91091658f275899bdd939265fd13c8d77f61

    • C:\Users\Admin\AppData\Local\Temp\nsyE061.tmp\Header.bmp

      Filesize

      27KB

      MD5

      f12f2234e5496f8518390223324d8b1c

      SHA1

      6e470e2b41ad38422a5beb4e7f4d28b721dcf2a5

      SHA256

      46fbe97a281202d59414e0ca9a68009b8423ff5fdbc0027f4a309b588c9af7ec

      SHA512

      d83aed727d741e1e7d036a2c4021195b46ec474e021486d5f699b2a651d27287af5aabab9772232ee57c6856670d128b21db356f061396ebf779ceaca0af36d7

    • \Program Files (x86)\SUDT\SUDT SerialNull\SerialNull.exe

      Filesize

      193KB

      MD5

      cfe544e042b57980bdc5c044e64d06a3

      SHA1

      38057e44e41d5eeb706e2e27b35b8e8d87d0fb24

      SHA256

      502f20ca9cf7259a73217d3144fdd2aefb697b997717b5a16e9c92a2d276afc9

      SHA512

      f741ac253760e579d9d0a10667863987ae35fbd806bbea9bef36f1062a7fea24358336d778970f44390576702568355c768453a9188ef9a9c13b84f88efd3e50

    • \Program Files (x86)\SUDT\SUDT SerialNull\install.exe

      Filesize

      57KB

      MD5

      242b49803d0dc2c25486ab866d8516cb

      SHA1

      8d4302a242f4e3be1678e21e9bf79cc27f123e7d

      SHA256

      0d03931dae04b1d6cae8d3745c3aff6315e0df8c6b0bb2589fe77b50580e88f6

      SHA512

      02ba717114ac8fe22898356403065203d719e97b6bc4ececaf849fb21e02529bf54f367bd3468103045cc63a60c77935d8efa04fec67f6d80b60e43067966577

    • \Users\Admin\AppData\Local\Temp\nsyE061.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      83c5a8e90cd10cb31a9215eb4421341f

      SHA1

      52ddbbfa955936f87516c52b2bb679a6b4363e22

      SHA256

      da006773e11871b8834036c30acab8fabcce2c9e9f52bb2b425f947bdf33f7c6

      SHA512

      46c20fd762a643028f3c4287ed3dbd762bc1cd17ee5ad1d90cbad23f15901fbab14b726d7f3e45eeb370fb6a2ee5268a2e9ebaae7ab6067c855361d24fc806a4

    • \Users\Admin\AppData\Local\Temp\nsyE061.tmp\System.dll

      Filesize

      10KB

      MD5

      d4d09da0218ba046a66a294f0cca9dfe

      SHA1

      417b1acdeb0a4de6ac752a93080ca5b9164eb44b

      SHA256

      9090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3

      SHA512

      3bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf

    • memory/1636-39-0x0000000002B20000-0x0000000002B30000-memory.dmp

      Filesize

      64KB

    • memory/1636-90-0x0000000002B20000-0x0000000002B30000-memory.dmp

      Filesize

      64KB

    • memory/1636-91-0x0000000002B70000-0x0000000002B80000-memory.dmp

      Filesize

      64KB