Resubmissions

01-03-2023 19:03

230301-xqjj8ahg39 8

26-02-2023 16:12

230226-tnwj8ahc3w 8

Analysis

  • max time kernel
    71s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2023 19:03

General

  • Target

    utorrent_installer.exe

  • Size

    1.7MB

  • MD5

    b6b16ce1d51baf68aedf62e35e9390c9

  • SHA1

    428efbd8c1a3a92eac36694ef4ed0ba76801342a

  • SHA256

    52dda648edf6eab8fdb5187e2866bb337e73e9025a0e13dced7abe00f899d44e

  • SHA512

    996fac7d5311dd258972df0ed9e392aeefbd9a11bc38614347f296fc62b6164d039c9ae21a9e10dc49019cd8f7bcd6e2d37c89d990de23de146ee90f560bacbb

  • SSDEEP

    24576:S4nXubIQGyxbPV0db26sdGr9Y0kpZZymuz7lnAjEHLcfVLKswfsQ:Sqe3f6b9Ynpryh71SaLcfxOfsQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\is-3BSM2.tmp\utorrent_installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3BSM2.tmp\utorrent_installer.tmp" /SL5="$A0122,874637,815104,C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91889adbb29f78dcbb53eb1e35576359

    SHA1

    ad3b3b5c1913f2e42f5154663d5d4f52ebbd6133

    SHA256

    941114c9f29f07b7971359dc21a46c81c155636c7a91ad6fde6e967530e38798

    SHA512

    0f844258e61bdad458a44e69b933399596fe662c2996ee3e9bc07c524f08e4ab1f46d0e422c1afe6b6196addd2ccb3e6f5a102c964180fab130e40768f63afaa

  • C:\Users\Admin\AppData\Local\Temp\Tar328D.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\is-3BSM2.tmp\utorrent_installer.tmp

    Filesize

    3.0MB

    MD5

    bee3a3ae058047dbe5d147b30d11c331

    SHA1

    3eba7c30a4bded07d58cf057781a4348a8313942

    SHA256

    1ff0cefbfe0905f845ef0e0f2f2b20d5f131ae126ba4acfbd368a6be879dd5c7

    SHA512

    b8128e25e45419a3fbef7874335ad25d959a7eb491545c819fcd7d48357e26b4df78452dbda7295a27c68dd7f1dd4c72b90b4ffa817be84535426f3fca37ba3e

  • C:\Users\Admin\AppData\Local\Temp\is-7ABIQ.tmp\Logo.png

    Filesize

    7KB

    MD5

    5424804c80db74e1304535141a5392c6

    SHA1

    6d749f3b59672b0c243690811ec3240ff2eced8e

    SHA256

    9b7e2ea77e518b50e5dd78e0faec509e791949a7c7f360a967c9ee204a8f1412

    SHA512

    6c7364b9693ce9cbbdbca60ecef3911dfe3d2d836252d7650d34506d2aa41fc5892028ba93f2619caf7edb06576fddae7e5f91f5844b5c3a47f54ca39f84cc6e

  • \Users\Admin\AppData\Local\Temp\is-3BSM2.tmp\utorrent_installer.tmp

    Filesize

    3.0MB

    MD5

    bee3a3ae058047dbe5d147b30d11c331

    SHA1

    3eba7c30a4bded07d58cf057781a4348a8313942

    SHA256

    1ff0cefbfe0905f845ef0e0f2f2b20d5f131ae126ba4acfbd368a6be879dd5c7

    SHA512

    b8128e25e45419a3fbef7874335ad25d959a7eb491545c819fcd7d48357e26b4df78452dbda7295a27c68dd7f1dd4c72b90b4ffa817be84535426f3fca37ba3e

  • \Users\Admin\AppData\Local\Temp\is-7ABIQ.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • memory/1176-64-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1176-190-0x0000000003630000-0x000000000363F000-memory.dmp

    Filesize

    60KB

  • memory/1176-197-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/1176-198-0x0000000003630000-0x000000000363F000-memory.dmp

    Filesize

    60KB

  • memory/1176-199-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1240-54-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1240-196-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB