Resubmissions
11-03-2023 21:36
230311-1gd5xsdb8x 711-03-2023 21:30
230311-1ct1ksdb6z 811-03-2023 21:18
230311-z5tpvabc85 8Analysis
-
max time kernel
74s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
11-03-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
Internet Download Manager 6.38.exe
Resource
win10v2004-20230220-es
General
-
Target
Internet Download Manager 6.38.exe
-
Size
13.1MB
-
MD5
3b92cc3d9e74a4c9ce8a4e0b52cfa5b6
-
SHA1
3364f2b2a9685a3a52a30e455934cf392362f59e
-
SHA256
435e71eca1998e991f6d99b4458fb253a84be79eaa50bab790342e3cfbf36097
-
SHA512
b1e32e50009c801fc2c64ec6218323a7080ab507d8b8a7fe51bb6c0796ca9f9ef74f1870293693967fb2d4d6f71b011fedd3d4b85993af4a93e243364ee5db17
-
SSDEEP
393216:lIB64fvSOb93lpgtmvtPODgYVa2njZZHygAK:064fKOh1pZvtPOEhSHyy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Internet Download Manager 6.38.tmppid process 3448 Internet Download Manager 6.38.tmp -
Loads dropped DLL 4 IoCs
Processes:
Internet Download Manager 6.38.tmppid process 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 4408 regedit.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
Internet Download Manager 6.38.tmppid process 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
regedit.exepid process 4408 regedit.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Internet Download Manager 6.38.tmppid process 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp 3448 Internet Download Manager 6.38.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Internet Download Manager 6.38.exedescription pid process target process PID 4696 wrote to memory of 3448 4696 Internet Download Manager 6.38.exe Internet Download Manager 6.38.tmp PID 4696 wrote to memory of 3448 4696 Internet Download Manager 6.38.exe Internet Download Manager 6.38.tmp PID 4696 wrote to memory of 3448 4696 Internet Download Manager 6.38.exe Internet Download Manager 6.38.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.38.exe"C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.38.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\is-PREIV.tmp\Internet Download Manager 6.38.tmp"C:\Users\Admin\AppData\Local\Temp\is-PREIV.tmp\Internet Download Manager 6.38.tmp" /SL5="$101D2,13410935,64512,C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.38.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3448
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:4408
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
911KB
MD5b69bcc1de18ec0c784d17f65db28e400
SHA1007fb94afdc8cc16ac6412672a32bc2f125f7fee
SHA25688f255dff2ed8e5d1d82ab96f39706904ba60e99dd0b0ca01f82730a4d8c9465
SHA512e3002eab9cf6cf750d1f3f65adf7e936cc78ee8f8fad7010119e4d2f86c1f8cfe617f932b500dd336508334cefa8e0ab2d8c788469a90cb1365a204b09d8e77f