Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2025 19:31

General

  • Target

    quarantine/Setup_2024.exe

  • Size

    3.4MB

  • MD5

    862fe5205353b8b771333e1c49bfce79

  • SHA1

    cdb767613dc8ce51f664830e1e770de7776524c8

  • SHA256

    7a0a69e7e2dabdd39fe3d5a5c2677aace72e3f308a9fe85f2fc04808df14611e

  • SHA512

    ec3a78f202d51796842b0eacf4d83ce5bb45358023249e632de028ecc1ab81374241b1ac9b2b8b8854a53109066dea9756b93ea160d2f89a77e5fa88cfec4b97

  • SSDEEP

    98304:LhwJnckvGgZwsiqVP3XhtgWB4Mu6pdPS/gi2TKo5npE8n7EtiYU:LucbgZf53RZBvu6vS/g3P5nS8n4tiYU

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\Setup_2024.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\Setup_2024.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Office 2024 Installer\Click To Run.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Program Files (x86)\Office 2024 Installer\setup.exe
        setup /configure configuration.xml
        3⤵
        • Checks computer location settings
        • Checks system information in the registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Office 2024 Installer\Click To Run.bat

    Filesize

    34B

    MD5

    ad3ed1d41f9b51f7f203d56597c05958

    SHA1

    724822195edeff84c01f298212dbaebf1b55a0d2

    SHA256

    413b8e555d8f42c56d22d6843708f7bfcb0bbedb4f833bf3c89880665925bd14

    SHA512

    dcb33488d6a8da2ca6ab1307fba58c68e62cd31e592058bf9c6a1621bff20da4b5df49684a7cac058b522619fd8b785446a251ae5656fba7a4d666dfa303f290

  • C:\Program Files (x86)\Office 2024 Installer\configuration.xml

    Filesize

    185B

    MD5

    b8a2f53fd00f8ac78982a497e2472497

    SHA1

    cbf48f1e17feb596089558334534bc18e4da8ddf

    SHA256

    d30e4b5cbf1c373de24cc2ba9a660bd5006dde136acdfe30cf194701c77c1f64

    SHA512

    1c742c54e3ebddbf0bb8f21e2561d900e0812c706c0f4115a28dd26303a5608fe9ce347997b764120779c9f80fabf79cbaf1b8419c69af6c891b6eadc1eb4db2

  • C:\Program Files (x86)\Office 2024 Installer\setup.exe

    Filesize

    7.4MB

    MD5

    7488d696f9a3d74e093b4c31ef7282c6

    SHA1

    777a182ed8ca8377581c91ac3d91b4b4fe233353

    SHA256

    b03c4cc3c1377ee81b1f94da126e58a30f484d4d935889538fae1c650dd6828b

    SHA512

    a40d074243ec3ced28fc8b4f3e00ccbfb755415540e655e29820b96b2569d530c21f46e3cb7aee24e46de2339207e46c6c4a05f7bd7ce5d85485952b9f881e08