Analysis
-
max time kernel
72s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe
Resource
win10v2004-20221111-en
General
-
Target
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe
-
Size
995KB
-
MD5
4fc302f4104a3a4c95e44d020101e218
-
SHA1
8adc2c5afe8e3e2439c52949ae64ec99940cf1b9
-
SHA256
0c57f90d98c5b6cb16c627631c4a599e031d6ca8f832d48cb0d972b65ec5ae33
-
SHA512
415d2f021ad6a090b39195263a5fd7844e4bdad421f4a1e6e6302c1f14936e106ea98467d8eddd1eb8a6fb7a4687b2d586c1ec1d9d9b5b6aadc50fff4dbd137a
-
SSDEEP
12288:zSxG0lssKssVs91x888888888888W88888888888X4bHrYc++Vx8eu1A6qmgJvsX:WxGOP4Lp++VCN1GvsvXB+3HI1Vsr3q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmppid process 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp -
Loads dropped DLL 3 IoCs
Processes:
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmppid process 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exeFreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmpdescription pid process target process PID 2664 wrote to memory of 2668 2664 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp PID 2664 wrote to memory of 2668 2664 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp PID 2664 wrote to memory of 2668 2664 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp PID 2668 wrote to memory of 3132 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp cmd.exe PID 2668 wrote to memory of 3132 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp cmd.exe PID 2668 wrote to memory of 3132 2668 FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe"C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-V8NDS.tmp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp"C:\Users\Admin\AppData\Local\Temp\is-V8NDS.tmp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmp" /SL5="$1501CA,492396,402432,C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C "ver > "C:\Users\Admin\AppData\Local\Temp\is-3N16A.tmp\~execwithresult.txt""3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-3N16A.tmp\freemake_dl.dllFilesize
131KB
MD50f7e2755583b0966fdacfad4fbd879ef
SHA1591e54a4c9c44dbe45acd2c7af5903bf4249d553
SHA2561d25515b00a83f032a6d4c21b8c374f14a7caf9cab7ade6905d178718552b3ec
SHA512995af0e78ab959f3c5be29bb26b10df555323884939392627639cad3695545f4452d5e8b084ce3eb97300747d53cf326738d868da2fad2355777ddb77a30bd62
-
C:\Users\Admin\AppData\Local\Temp\is-3N16A.tmp\itdownload.dllFilesize
77KB
MD5b4efe1200f09cbf02f0d2ae326a84f3b
SHA183102a7f5465a14c78d04ca6d8703c68a5c599ce
SHA2566bd9984dd28ce8cc13e8eb3b5ee9f6c8a6967e3b2288918665e2ae67fa1eb56b
SHA51214c83df5ca8ce92efddb07bda1c6fff9cfbbfb1348ff6c2e6b523110bb1fd10023e09986bc7967824a5cf37789080d81f2a5deedc3df3925825f73e2a87b52a6
-
C:\Users\Admin\AppData\Local\Temp\is-3N16A.tmp\itdownload.dllFilesize
77KB
MD5b4efe1200f09cbf02f0d2ae326a84f3b
SHA183102a7f5465a14c78d04ca6d8703c68a5c599ce
SHA2566bd9984dd28ce8cc13e8eb3b5ee9f6c8a6967e3b2288918665e2ae67fa1eb56b
SHA51214c83df5ca8ce92efddb07bda1c6fff9cfbbfb1348ff6c2e6b523110bb1fd10023e09986bc7967824a5cf37789080d81f2a5deedc3df3925825f73e2a87b52a6
-
C:\Users\Admin\AppData\Local\Temp\is-3N16A.tmp\~execwithresult.txtFilesize
47B
MD51a1ea0c1a7df5f91ecd62cda837a3273
SHA1f358bcfc14b04949db83e04c4e181f526b3fc5f3
SHA2569fea0616868155973e2b5ca5d1524359e47916e8aee14dfad123b533c737ee76
SHA512666a013157c5544ef7ebad000d6a5e0f2b4020bb7e7d8792880b7c35c662b1c710e25a8893f75b8599cba5bb934c18f91a689f0f24c53b287e601475b1ae9f01
-
C:\Users\Admin\AppData\Local\Temp\is-V8NDS.tmp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmpFilesize
1.4MB
MD57e4aa70d53b36013428377346e0e268c
SHA1b45756feef67b76d1d0caa459f035c3c115d4b0e
SHA256642553254d18fbca9150d18b8189a502fed5f9e625a7fc58d3aafabb16a76893
SHA5121b23c1f532327c3006225f345251a907875699c063bc3a47843b8ceb67b473f5404d4df50543a15d6fac002c7109eaa155c0f00c017182b93d71208e6e3180b8
-
C:\Users\Admin\AppData\Local\Temp\is-V8NDS.tmp\FreemakeVideoDownloaderSetup_ccdd6c8f-6755-bacf-4ab8-66b08c09392e.tmpFilesize
1.4MB
MD57e4aa70d53b36013428377346e0e268c
SHA1b45756feef67b76d1d0caa459f035c3c115d4b0e
SHA256642553254d18fbca9150d18b8189a502fed5f9e625a7fc58d3aafabb16a76893
SHA5121b23c1f532327c3006225f345251a907875699c063bc3a47843b8ceb67b473f5404d4df50543a15d6fac002c7109eaa155c0f00c017182b93d71208e6e3180b8
-
memory/2664-132-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2664-137-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2664-142-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2668-134-0x0000000000000000-mapping.dmp
-
memory/2668-140-0x0000000003310000-0x0000000003328000-memory.dmpFilesize
96KB
-
memory/3132-143-0x0000000000000000-mapping.dmp