Analysis

  • max time kernel
    140s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2023 03:40

General

  • Target

    utorrent_installer.exe

  • Size

    1.7MB

  • MD5

    b6b16ce1d51baf68aedf62e35e9390c9

  • SHA1

    428efbd8c1a3a92eac36694ef4ed0ba76801342a

  • SHA256

    52dda648edf6eab8fdb5187e2866bb337e73e9025a0e13dced7abe00f899d44e

  • SHA512

    996fac7d5311dd258972df0ed9e392aeefbd9a11bc38614347f296fc62b6164d039c9ae21a9e10dc49019cd8f7bcd6e2d37c89d990de23de146ee90f560bacbb

  • SSDEEP

    24576:S4nXubIQGyxbPV0db26sdGr9Y0kpZZymuz7lnAjEHLcfVLKswfsQ:Sqe3f6b9Ynpryh71SaLcfxOfsQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\is-9K1JK.tmp\utorrent_installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9K1JK.tmp\utorrent_installer.tmp" /SL5="$70126,874637,815104,C:\Users\Admin\AppData\Local\Temp\utorrent_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc1e8d9ea0106a58535da75d78742535

    SHA1

    39984380acef8eef0dc408e13df9148253aee5cd

    SHA256

    4070c498faafc24b553ba9ea2eb88b88912964545eaa0b4da75dba8ec4ded3da

    SHA512

    76e0397bf8011a35441cf97db35bdbd8303ec1b836e697cab85ca702838785e71c078c377d4b9472cac0dbef1d3247562483ce4ce8af8519eb10a4410e743cd0

  • C:\Users\Admin\AppData\Local\Temp\Tar1962.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\is-9K1JK.tmp\utorrent_installer.tmp

    Filesize

    3.0MB

    MD5

    bee3a3ae058047dbe5d147b30d11c331

    SHA1

    3eba7c30a4bded07d58cf057781a4348a8313942

    SHA256

    1ff0cefbfe0905f845ef0e0f2f2b20d5f131ae126ba4acfbd368a6be879dd5c7

    SHA512

    b8128e25e45419a3fbef7874335ad25d959a7eb491545c819fcd7d48357e26b4df78452dbda7295a27c68dd7f1dd4c72b90b4ffa817be84535426f3fca37ba3e

  • C:\Users\Admin\AppData\Local\Temp\is-OTM4E.tmp\Logo.png

    Filesize

    7KB

    MD5

    5424804c80db74e1304535141a5392c6

    SHA1

    6d749f3b59672b0c243690811ec3240ff2eced8e

    SHA256

    9b7e2ea77e518b50e5dd78e0faec509e791949a7c7f360a967c9ee204a8f1412

    SHA512

    6c7364b9693ce9cbbdbca60ecef3911dfe3d2d836252d7650d34506d2aa41fc5892028ba93f2619caf7edb06576fddae7e5f91f5844b5c3a47f54ca39f84cc6e

  • \Users\Admin\AppData\Local\Temp\is-9K1JK.tmp\utorrent_installer.tmp

    Filesize

    3.0MB

    MD5

    bee3a3ae058047dbe5d147b30d11c331

    SHA1

    3eba7c30a4bded07d58cf057781a4348a8313942

    SHA256

    1ff0cefbfe0905f845ef0e0f2f2b20d5f131ae126ba4acfbd368a6be879dd5c7

    SHA512

    b8128e25e45419a3fbef7874335ad25d959a7eb491545c819fcd7d48357e26b4df78452dbda7295a27c68dd7f1dd4c72b90b4ffa817be84535426f3fca37ba3e

  • \Users\Admin\AppData\Local\Temp\is-OTM4E.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • memory/1544-54-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1544-196-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1732-64-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1732-190-0x0000000003630000-0x000000000363F000-memory.dmp

    Filesize

    60KB

  • memory/1732-197-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/1732-198-0x0000000003630000-0x000000000363F000-memory.dmp

    Filesize

    60KB

  • memory/1732-199-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB