Edit tour
Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 57 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 20 |
Range: | 0 - 100 |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Creates multiple autostart registry keys
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Drops PE files
EXE planting / hijacking vulnerabilities found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a global mouse hook
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Classification
- System is w10x64
- Setup.exe (PID: 3688 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 92C35FBE82BF7E416805C9286746AC4D) - chrome.exe (PID: 5028 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// pcapp.stor e/installi ng.php?gui d=2ED92742 -89DC-DD72 -92E8-869F A5A66493&w inver=1904 5&version= fa.1092c&n ocache=202 4111116251 8.134&_fci d=17313542 02975821 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 612 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2084 --fi eld-trial- handle=190 4,i,165698 3357958659 4677,17085 6648659359 60481,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7356 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= audio.mojo m.AudioSer vice --lan g=en-US -- service-sa ndbox-type =audio --m ojo-platfo rm-channel -handle=51 76 --field -trial-han dle=1904,i ,165698335 7958659467 7,17085664 8659359604 81,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7368 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= video_capt ure.mojom. VideoCaptu reService --lang=en- US --servi ce-sandbox -type=none --mojo-pl atform-cha nnel-handl e=5332 --f ield-trial -handle=19 04,i,16569 8335795865 94677,1708 5664865935 960481,262 144 --disa ble-featur es=Optimiz ationGuide ModelDownl oading,Opt imizationH ints,Optim izationHin tsFetching ,Optimizat ionTargetP rediction /prefetch: 8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - nsx2B3B.tmp (PID: 7436 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\nsx2B3 B.tmp" /in ternal 173 1354202975 821 /force MD5: 84EE733F8014D22DAD2DFEF725489980) - PcAppStore.exe (PID: 7972 cmdline:
"C:\Users\ user\PCApp Store\PcAp pStore.exe " /init de fault MD5: 4B88D8ADA8D22622C30D581FC38EAA52) - explorer.exe (PID: 1028 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) - PcAppStore.exe (PID: 4752 cmdline:
"C:\Users\ user\PCApp Store\PCAp pStore.exe " /init de fault MD5: 4B88D8ADA8D22622C30D581FC38EAA52) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 2412 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3816 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5528 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5756 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 4396 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 4400 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3724 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3680 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3200 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3376 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3944 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 2180 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 2464 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 4424 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3748 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3092 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 1856 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 4764 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5816 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 6076 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 6664 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5912 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 6276 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5888 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 5952 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 3692 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - GkiQFNeggQCCdOqsaJMVyEE.exe (PID: 4204 cmdline:
"C:\Progra m Files (x 86)\VnuTZA AKDiIRzovf JOdTLcBQVZ osdqqRnxgW wAPStUZXjP jwbAQBddTn DjTS\GkiQF NeggQCCdOq saJMVyEE.e xe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - Watchdog.exe (PID: 8004 cmdline:
"C:\Users\ user\PCApp Store\Watc hdog.exe" /guid=2ED9 2742-89DC- DD72-92E8- 869FA5A664 93 /rid=20 2411111626 08.2856305 78 /ver=fa .1092c MD5: 11F3801CB9FF046D6075F681971C4EB8)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-11T22:26:09.425592+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57525 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:24.318661+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57535 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:26.148946+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57539 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:27.390920+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57542 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:29.264151+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57548 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:33.671322+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57562 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:34.196301+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57570 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:35.250091+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57593 | 147.182.211.77 | 443 | TCP |
2024-11-11T22:26:36.971083+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57597 | 147.182.211.77 | 443 | TCP |
2024-11-11T22:26:38.546200+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57602 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:40.102953+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57605 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:51.838113+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57612 | 167.99.235.203 | 443 | TCP |
2024-11-11T22:26:53.190746+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 57614 | 167.99.235.203 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Compliance |
---|
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Registry value created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |