Overview
overview
10Static
static
3Setup_Pane...in.rar
windows11-21h2-x64
10DESIGNER/MSADDNDR.dll
windows11-21h2-x64
1Licenses/n...se.rtf
windows11-21h2-x64
1Licenses/n...se.rtf
windows11-21h2-x64
1Licenses/n...se.rtf
windows11-21h2-x64
1Licenses/n...se.rtf
windows11-21h2-x64
1Licenses/n...se.rtf
windows11-21h2-x64
1Setup.exe
windows11-21h2-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/12/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Panel_x64_win.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
DESIGNER/MSADDNDR.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Licenses/neutral/OEM/Professional/de-license.rtf
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Licenses/neutral/OEM/Professional/license.rtf
Resource
win11-20241023-en
Behavioral task
behavioral5
Sample
Licenses/neutral/Volume/Professional/license.rtf
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Licenses/neutral/_Default/Professional/de-license.rtf
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Licenses/neutral/_Default/Professional/license.rtf
Resource
win11-20241007-en
General
-
Target
Setup.exe
-
Size
98.2MB
-
MD5
c681f05fe3025f3a23833da6e100ba9d
-
SHA1
7e862b1895561bc3aca9595210276b0f6597636a
-
SHA256
94215092f8c5b6b91c39458b51665a3cd62c35706ad8c2908d7eb6d74d17702b
-
SHA512
106d6d41738691fa6fe49ae313bc2d85fa8d7a7dd8283899aa01c6d056053a23d5bf569af601a42c65eca2bdee334af65fd745cfbf26c67b4a1eb6f1fe9158d3
-
SSDEEP
12288:upjQGbC5X/m4WTfzf2ugUNkYn40lhETt3EqEELHZIQnlT1H:kjLmXRyfTNfNki/ktUqEEL5IO
Malware Config
Extracted
stealc
670052684
http://178.63.148.7
-
url_path
/875489374a8fad8f.php
Signatures
-
Stealc family
-
Loads dropped DLL 2 IoCs
pid Process 1416 Setup.exe 1456 MSBuild.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1416 set thread context of 1456 1416 Setup.exe 78 PID 1456 set thread context of 2956 1456 MSBuild.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 3948 2956 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aspnet_regiis.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aspnet_regiis.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 aspnet_regiis.exe 2956 aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1416 wrote to memory of 1456 1416 Setup.exe 78 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79 PID 1456 wrote to memory of 2956 1456 MSBuild.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 12604⤵
- Program crash
PID:3948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2956 -ip 29561⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625KB
MD5b3d94421e2b58e3f439e5a98637962af
SHA1c8d54b23bb58962d6a428371953e1d0ab36d5987
SHA256c21e28073425ea6fd725c176beb617589562d41819fd909383223176113c56f5
SHA512935979ed19747ea79f4b91681d3769acd369ef3261d3251570e203f1644041516db486bfc91dbf055441a5b1798d9ed2002728537d83fcdfec8179f5cbc5943e
-
Filesize
582KB
MD5fc75d66b8daf935a4bee91d24f3609c3
SHA1b34ef2128e4c36bf6fcc09af08bcef50d35e0227
SHA2567adc248b5efc0cceb3a2e4540dab54a6a4dec434950443342657c99c4dc18952
SHA512a6eaafab8224c158b9772edfed9934f7dfecc231c393382643cb67ac0283596156479a63a9b6f8824d5f2bf9943ff60a7fbc209896f6730b3b8c66d6adc91608