Analysis
-
max time kernel
93s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 02:37
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
General
-
Target
Setup.exe
-
Size
98.2MB
-
MD5
c681f05fe3025f3a23833da6e100ba9d
-
SHA1
7e862b1895561bc3aca9595210276b0f6597636a
-
SHA256
94215092f8c5b6b91c39458b51665a3cd62c35706ad8c2908d7eb6d74d17702b
-
SHA512
106d6d41738691fa6fe49ae313bc2d85fa8d7a7dd8283899aa01c6d056053a23d5bf569af601a42c65eca2bdee334af65fd745cfbf26c67b4a1eb6f1fe9158d3
-
SSDEEP
12288:upjQGbC5X/m4WTfzf2ugUNkYn40lhETt3EqEELHZIQnlT1H:kjLmXRyfTNfNki/ktUqEEL5IO
Malware Config
Extracted
stealc
670052684
http://178.63.148.7
-
url_path
/875489374a8fad8f.php
Signatures
-
Stealc family
-
Loads dropped DLL 2 IoCs
pid Process 2716 Setup.exe 3376 MSBuild.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2716 set thread context of 3376 2716 Setup.exe 83 PID 3376 set thread context of 3332 3376 MSBuild.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 2716 wrote to memory of 3376 2716 Setup.exe 83 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84 PID 3376 wrote to memory of 3332 3376 MSBuild.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵PID:3332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625KB
MD5b3d94421e2b58e3f439e5a98637962af
SHA1c8d54b23bb58962d6a428371953e1d0ab36d5987
SHA256c21e28073425ea6fd725c176beb617589562d41819fd909383223176113c56f5
SHA512935979ed19747ea79f4b91681d3769acd369ef3261d3251570e203f1644041516db486bfc91dbf055441a5b1798d9ed2002728537d83fcdfec8179f5cbc5943e
-
Filesize
582KB
MD5fc75d66b8daf935a4bee91d24f3609c3
SHA1b34ef2128e4c36bf6fcc09af08bcef50d35e0227
SHA2567adc248b5efc0cceb3a2e4540dab54a6a4dec434950443342657c99c4dc18952
SHA512a6eaafab8224c158b9772edfed9934f7dfecc231c393382643cb67ac0283596156479a63a9b6f8824d5f2bf9943ff60a7fbc209896f6730b3b8c66d6adc91608