Analysis
-
max time kernel
349s -
max time network
409s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe
Resource
win10v2004-20221111-en
General
-
Target
f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe
-
Size
192KB
-
MD5
7e1503ad5baf651c35250ae91a9ae771
-
SHA1
fc0385d0735619e981dd9569651f370b00054058
-
SHA256
f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014
-
SHA512
e2f147382b9bb55ff5473514e8bdcf8b7d85a665d9077618c1f60888a0116d9721107227af7671bd8453d5312ee5cd632d46d94fddf23a3aa5d6d0578efc259b
-
SSDEEP
6144:Ie346lK2ElbxBuKHBS1EEQoVGkJpDBhk6RZ5:bU2EllBuKHcEEQonDdhkq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 torrent.exe -
Loads dropped DLL 9 IoCs
pid Process 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe 1704 torrent.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\intellidownload\skip.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\cc torrent.exe File created C:\Program Files (x86)\intellidownload\torrent.exe f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe File created C:\Program Files (x86)\intellidownload\gunzip.exe torrent.exe File created C:\Program Files (x86)\intellidownload\header.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header2.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header3.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\next.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\installid torrent.exe File created C:\Program Files (x86)\intellidownload\status torrent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0007000000022dd5-134.dat nsis_installer_1 behavioral2/files/0x0007000000022dd5-134.dat nsis_installer_2 behavioral2/files/0x0007000000022dd5-133.dat nsis_installer_1 behavioral2/files/0x0007000000022dd5-133.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1704 4044 f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe 82 PID 4044 wrote to memory of 1704 4044 f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe 82 PID 4044 wrote to memory of 1704 4044 f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe"C:\Users\Admin\AppData\Local\Temp\f4eedae10dd5c5ba78b4f7a2c8adda47e0b90f0379ba1230b658d2d181404014.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\intellidownload\torrent.exe"C:\Program Files (x86)\intellidownload\torrent.exe" "/name=Lockout UNRATED BDRip XviD-COCAIN" "/publisher=1014" "/sub=torrent" "/search=Lockout UNRATED BDRip XviD-COCAIN" "/type=search" "/tag=1"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e