Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
AnyViewerSetup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
AnyViewerSetup.exe
Resource
win10v2004-20240508-en
General
-
Target
AnyViewerSetup.exe
-
Size
36.3MB
-
MD5
199f287b81b00d54ec6e12c313bbdc4e
-
SHA1
25ff04330d5a1fafae592f0d07e9e6ecfc61db60
-
SHA256
334ec9e7d937c42e8ef12f9d4ec90862ecc5410c06442393a38390b34886aa59
-
SHA512
1006d0c84c5f8bdcf50670958f24a7d0a3d0dff54d620d1dcc5d9e057269dbc506a7e622172ab673aed108b4e0ab0e7569fc89898e335c74d2c61ca6e354f16a
-
SSDEEP
786432:e0ea8KPO0BEreQ/dyD7VVZIXPMA/h9rWsyd6d0z1CojZSd23Y9z9o2VRrtp:ePKP3mJ/8D7hkj/b1ydFZjZS59BLpp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
AnyViewerSetup.tmppid process 2552 AnyViewerSetup.tmp -
Loads dropped DLL 8 IoCs
Processes:
AnyViewerSetup.exeAnyViewerSetup.tmppid process 2184 AnyViewerSetup.exe 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp 2552 AnyViewerSetup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
AnyViewerSetup.exedescription pid process target process PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp PID 2184 wrote to memory of 2552 2184 AnyViewerSetup.exe AnyViewerSetup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyViewerSetup.exe"C:\Users\Admin\AppData\Local\Temp\AnyViewerSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-RUFGG.tmp\AnyViewerSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-RUFGG.tmp\AnyViewerSetup.tmp" /SL5="$8001C,37462717,619008,C:\Users\Admin\AppData\Local\Temp\AnyViewerSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\Checkblue.pngFilesize
535B
MD503852e4119bcbf5c8acf22120e956065
SHA1a880595e09b1c89f5301684a355d42068a4aec77
SHA256093f883620fe51cf139e131ce254c8969e33ade7bf8728a8e25e26c07ef070b8
SHA51201245fc3ec1db821864b7b46f50911025c8cb583a3d75a83a70fa79191aa562e006f4933e8776a66bd2c039035074e170ab12f00d2399a757c773c803fb19374
-
C:\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\btopen.pngFilesize
2KB
MD590eb121bf0ae802f3ad12bc6582ca691
SHA18647260945740e2cd97a97b7cee6e5016688166f
SHA25685a908620121820c1c40303d6e268bac586c469cbfbfe864143a2c96d171f56c
SHA512881bdec3c122b7baaf81c01f91b24409377602c0d9398b09aa3ad7cb965d347bcee5e631ca87636edfad693d5666b8339ee45e8877500f78f823817d449ec8e1
-
C:\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\iconclose.pngFilesize
4KB
MD54b00487ff65448660795f0932ed58419
SHA1b30870e50fe366335191ccab3418272b5a0fd7cd
SHA256f81cbf673e0a8c2708cc6c2e84f589a4e347255cab30ab68c064cf41c7b9e684
SHA512e3e971e79cb901eb1097c28c0a459a6abd5d7504029d13542cc11b8ceeed8fb38d71da77f31e036956af792bd3411d3182a5f2df514e8de0396f396941c0e1ef
-
C:\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\iconminimize.pngFilesize
2KB
MD548b8fe1b77dfbc4b929245e1866634d6
SHA16c8c540cdae147b2ed0d623eaba7946fa592a4c5
SHA2569ef1a17cbc12f12e0de6ccb45b99b21733bc24156fb97e4116894af879f0f194
SHA51280603d2df7c39d2939959ca782429ede5abd0f730fef4329ac20f380b7d3f46991df14c255f3fab1e1f241f56160217f381f9542cbddae3ff0ced78dbcb9d8f4
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\CallbackCtrl.dllFilesize
21KB
MD5e4aaa24dd6549ca02e0fc45302345dd0
SHA1f9e477719cdffadb39d42cc4a3e9e2e70277e3ed
SHA2569fb8c2522b2c5f826bacd1bf5cb42af70aa2080fb680f96e747d3900eb40a6f9
SHA512d04a788ebaffe0c4df0192f643f394e2c2ad026099ee2f26b94bc76f7685b70967d23b104f18a8acb8017f1da1c957a844e2f2aac7084228d02b183ae7150340
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\MFCButton.dllFilesize
220KB
MD52581ae0a7a36a6a389ea9cebb4f01f39
SHA1bca0bb11737a79d8a2bc7f01a91985e25b0153fc
SHA256e9304127981fd0b4e7f5cc2c19d8618b7deb0c3c9149045af66c5f7d6aa89222
SHA512f2921c1487bda5d8dfd3cc274f758ea067f90565df1b5356fee9f9195486b5fd5618df6bbc653a2f703fd5e4c4f64d0a3e073787090c95c7b46890fc93b5868b
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\PathFormat.dllFilesize
221KB
MD5ed26aedade2f4ca5da61ff5baa1a16d7
SHA11f9e736c00ff3b635ad89097937f16039ab00578
SHA2560de968ffd4a6c60413cac739dccb1b162f8f93f3db754728fde8738e52706fa4
SHA512e7b09cb39ee20fc8cff856b27b3b6a769a825b6de64e7161fa8e4b4abfd91808d22a7dc58af2adda66f0d7c32abcb89237d1e9568500e4b2ec65eed7d511d223
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\_isetup\_isdecmp.dllFilesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-NFKML.tmp\botva2.dllFilesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
\Users\Admin\AppData\Local\Temp\is-RUFGG.tmp\AnyViewerSetup.tmpFilesize
1.9MB
MD58ce6b53ded85e3ddd7bd5cff708b5a83
SHA1dcd11bb9fde1342da724a5f24e878699be4ef48c
SHA2563cb8ae64d7ccbf948f83b069a2ed9be9479d278a34c07e54796b80da69516c9c
SHA51215e067c814f9330b7b324db69a5db545756286e7fed536479e3705fd431674f32aaef3e144c2eb8142c1e970064e610b1f557fd7aa3aa1d18e23a64ad0ce0f94
-
memory/2184-0-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/2184-2-0x0000000000401000-0x0000000000417000-memory.dmpFilesize
88KB
-
memory/2184-100-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/2552-61-0x0000000002160000-0x000000000216E000-memory.dmpFilesize
56KB
-
memory/2552-8-0x0000000000400000-0x00000000005ED000-memory.dmpFilesize
1.9MB
-
memory/2552-84-0x0000000003980000-0x00000000039BA000-memory.dmpFilesize
232KB
-
memory/2552-102-0x0000000002160000-0x000000000216E000-memory.dmpFilesize
56KB
-
memory/2552-101-0x0000000000400000-0x00000000005ED000-memory.dmpFilesize
1.9MB