Analysis
-
max time kernel
14s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-es -
resource tags
arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
26-02-2023 16:12
Static task
static1
Behavioral task
behavioral1
Sample
utorrent_installer.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
utorrent_installer.exe
Resource
win10v2004-20230221-es
General
-
Target
utorrent_installer.exe
-
Size
1.7MB
-
MD5
b6b16ce1d51baf68aedf62e35e9390c9
-
SHA1
428efbd8c1a3a92eac36694ef4ed0ba76801342a
-
SHA256
52dda648edf6eab8fdb5187e2866bb337e73e9025a0e13dced7abe00f899d44e
-
SHA512
996fac7d5311dd258972df0ed9e392aeefbd9a11bc38614347f296fc62b6164d039c9ae21a9e10dc49019cd8f7bcd6e2d37c89d990de23de146ee90f560bacbb
-
SSDEEP
24576:S4nXubIQGyxbPV0db26sdGr9Y0kpZZymuz7lnAjEHLcfVLKswfsQ:Sqe3f6b9Ynpryh71SaLcfxOfsQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1424 utorrent_installer.tmp -
Loads dropped DLL 2 IoCs
pid Process 1424 utorrent_installer.tmp 1424 utorrent_installer.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1424 1696 utorrent_installer.exe 84 PID 1696 wrote to memory of 1424 1696 utorrent_installer.exe 84 PID 1696 wrote to memory of 1424 1696 utorrent_installer.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\is-T7K30.tmp\utorrent_installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-T7K30.tmp\utorrent_installer.tmp" /SL5="$B006E,874637,815104,C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55424804c80db74e1304535141a5392c6
SHA16d749f3b59672b0c243690811ec3240ff2eced8e
SHA2569b7e2ea77e518b50e5dd78e0faec509e791949a7c7f360a967c9ee204a8f1412
SHA5126c7364b9693ce9cbbdbca60ecef3911dfe3d2d836252d7650d34506d2aa41fc5892028ba93f2619caf7edb06576fddae7e5f91f5844b5c3a47f54ca39f84cc6e
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
3.0MB
MD5bee3a3ae058047dbe5d147b30d11c331
SHA13eba7c30a4bded07d58cf057781a4348a8313942
SHA2561ff0cefbfe0905f845ef0e0f2f2b20d5f131ae126ba4acfbd368a6be879dd5c7
SHA512b8128e25e45419a3fbef7874335ad25d959a7eb491545c819fcd7d48357e26b4df78452dbda7295a27c68dd7f1dd4c72b90b4ffa817be84535426f3fca37ba3e