Analysis
-
max time kernel
228s -
max time network
248s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 10:23
Static task
static1
Behavioral task
behavioral1
Sample
GitCoin-dApp-2.1.2-installer.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
GitCoin-dApp-2.1.2-installer.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
GitCoin-dApp-2.1.2-installer.exe
-
Size
118.6MB
-
MD5
53700031ae88e5c268791f39d4cda497
-
SHA1
4a43ebfc2c9aa93e977010779923bbcac160c38a
-
SHA256
f3be2e863702dbf427638492c35ac59f43f05bc451d667ba88798de67227ea79
-
SHA512
1356548c3fc862894f1e30997910f8f44e2928a38fa132749e2ce9a9ea95126557798304fb6833d603962979405f21f8a8225b2bb0d42a594ae5e1722a47f5ea
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral1/files/0x000500000001404e-109.dat family_babadeda behavioral1/memory/1040-110-0x00000000052C0000-0x00000000092C0000-memory.dmp family_babadeda -
Executes dropped EXE 3 IoCs
pid Process 1412 GitCoin-dApp-2.1.2-installer.tmp 1160 makecat.exe 1040 link.exe -
Loads dropped DLL 23 IoCs
pid Process 1148 GitCoin-dApp-2.1.2-installer.exe 1412 GitCoin-dApp-2.1.2-installer.tmp 1412 GitCoin-dApp-2.1.2-installer.tmp 1412 GitCoin-dApp-2.1.2-installer.tmp 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe 1040 link.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1412 GitCoin-dApp-2.1.2-installer.tmp 1412 GitCoin-dApp-2.1.2-installer.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1048 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1048 AUDIODG.EXE Token: 33 1048 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1048 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 GitCoin-dApp-2.1.2-installer.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1040 link.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1148 wrote to memory of 1412 1148 GitCoin-dApp-2.1.2-installer.exe 29 PID 1412 wrote to memory of 1160 1412 GitCoin-dApp-2.1.2-installer.tmp 30 PID 1412 wrote to memory of 1160 1412 GitCoin-dApp-2.1.2-installer.tmp 30 PID 1412 wrote to memory of 1160 1412 GitCoin-dApp-2.1.2-installer.tmp 30 PID 1412 wrote to memory of 1160 1412 GitCoin-dApp-2.1.2-installer.tmp 30 PID 1412 wrote to memory of 1040 1412 GitCoin-dApp-2.1.2-installer.tmp 32 PID 1412 wrote to memory of 1040 1412 GitCoin-dApp-2.1.2-installer.tmp 32 PID 1412 wrote to memory of 1040 1412 GitCoin-dApp-2.1.2-installer.tmp 32 PID 1412 wrote to memory of 1040 1412 GitCoin-dApp-2.1.2-installer.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\GitCoin-dApp-2.1.2-installer.exe"C:\Users\Admin\AppData\Local\Temp\GitCoin-dApp-2.1.2-installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\is-H59RN.tmp\GitCoin-dApp-2.1.2-installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-H59RN.tmp\GitCoin-dApp-2.1.2-installer.tmp" /SL5="$E0150,123558640,875520,C:\Users\Admin\AppData\Local\Temp\GitCoin-dApp-2.1.2-installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"3⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048