Analysis

  • max time kernel
    144s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2023 22:25

General

  • Target

    Filmora9/Filmora.exe

  • Size

    143KB

  • MD5

    2b5f1a573ecaeaa00157c594fb507995

  • SHA1

    3b7a29cf0081d735741efcd9384b23de64e12338

  • SHA256

    5ec69ddfad63216095655cfd621865c83641d559ba8c749e1c937e4561dcab7e

  • SHA512

    988ddeb6cd9c1616963382bf75b06bee19931db03a18acb7050ffcd512146815c6eaa31f2f53ad319052e3569892b86bb9d29c3e65253e50b28e74ae74538b95

  • SSDEEP

    1536:z9DsEqyI866rxALJTYI91KaU+zc2Xpp8eNptWGkUnTs2ZBpki0g16E9azjXCAAk9:ZFpIStG31Kn4zTPNkGEzjSIneTX02202

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Filmora9\Filmora.exe
    "C:\Users\Admin\AppData\Local\Temp\Filmora9\Filmora.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\AppData\Local\Temp\Filmora9\Wondershare Filmora9.exe
      "C:\Users\Admin\AppData\Local\Temp\Filmora9\Wondershare Filmora9.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D9Test.exe
        C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D9Test.exe 4
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:4244
      • C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D11Test.exe
        C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D11Test.exe 5
        3⤵
          PID:3420
        • C:\Users\Admin\AppData\Local\Temp\Filmora9\GLTest.exe
          C:\Users\Admin\AppData\Local\Temp\Filmora9\GLTest.exe 3
          3⤵
            PID:4708
          • C:\Users\Admin\AppData\Local\Temp\Filmora9\oclTest.exe
            C:\Users\Admin\AppData\Local\Temp\Filmora9\oclTest.exe --blacklist C:\Users\Admin\AppData\Local\Temp\Filmora9\opencl_black_list.xml --whitelist C:\Users\Admin\AppData\Local\Temp\Filmora9\opencl_white_list.xml
            3⤵
              PID:2944

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Filmora9\Log\NLELog.txt
          Filesize

          1.1MB

          MD5

          3fa3af58d1a5bcaf9ac79ab2fa847795

          SHA1

          645837ae47ddd1d1f6c3956f89601d8a54dd00fe

          SHA256

          eaa28dd65b8893883b98637d2d6a35b7051f9d983ab93dee69f6ca11c73a525c

          SHA512

          2752fff6dce6e83e51771ff038ab0af5c3b0dba141b7998ec80881c129a7c1b77ecdc5d1f0c30e017177d7e6098a3efdc924645ab1a43e45b682c8b180081278

        • C:\Users\Admin\AppData\Local\Temp\Filmora9\log\NLELog.txt
          Filesize

          1.1MB

          MD5

          3fa3af58d1a5bcaf9ac79ab2fa847795

          SHA1

          645837ae47ddd1d1f6c3956f89601d8a54dd00fe

          SHA256

          eaa28dd65b8893883b98637d2d6a35b7051f9d983ab93dee69f6ca11c73a525c

          SHA512

          2752fff6dce6e83e51771ff038ab0af5c3b0dba141b7998ec80881c129a7c1b77ecdc5d1f0c30e017177d7e6098a3efdc924645ab1a43e45b682c8b180081278

        • memory/2968-139-0x00007FFF35360000-0x00007FFF3578B000-memory.dmp
          Filesize

          4.2MB

        • memory/2968-163-0x00007FFF16AF0000-0x00007FFF16B00000-memory.dmp
          Filesize

          64KB

        • memory/2968-137-0x00007FFF39010000-0x00007FFF39331000-memory.dmp
          Filesize

          3.1MB

        • memory/2968-134-0x0000000052360000-0x00000000528A2000-memory.dmp
          Filesize

          5.3MB

        • memory/2968-138-0x00007FFF38910000-0x00007FFF39007000-memory.dmp
          Filesize

          7.0MB

        • memory/2968-140-0x00007FFF33070000-0x00007FFF332B6000-memory.dmp
          Filesize

          2.3MB

        • memory/2968-141-0x00007FFF33070000-0x00007FFF332B6000-memory.dmp
          Filesize

          2.3MB

        • memory/2968-144-0x0000017F4ADC0000-0x0000017F4AFB5000-memory.dmp
          Filesize

          2.0MB

        • memory/2968-155-0x0000017F4B290000-0x0000017F4B559000-memory.dmp
          Filesize

          2.8MB

        • memory/2968-135-0x00007FF77DD80000-0x00007FF77E15E000-memory.dmp
          Filesize

          3.9MB

        • memory/2968-214-0x0000000064800000-0x0000000066293000-memory.dmp
          Filesize

          26.6MB

        • memory/2968-215-0x0000000062480000-0x000000006249F000-memory.dmp
          Filesize

          124KB

        • memory/2968-216-0x00007FFF33070000-0x00007FFF332B6000-memory.dmp
          Filesize

          2.3MB

        • memory/2968-136-0x00007FFF39340000-0x00007FFF3956A000-memory.dmp
          Filesize

          2.2MB

        • memory/2968-213-0x0000017F488F0000-0x0000017F48966000-memory.dmp
          Filesize

          472KB

        • memory/4244-188-0x00007FFF33070000-0x00007FFF332B6000-memory.dmp
          Filesize

          2.3MB

        • memory/4244-182-0x000002EC54B70000-0x000002EC54E39000-memory.dmp
          Filesize

          2.8MB

        • memory/4244-168-0x00007FFF33070000-0x00007FFF332B6000-memory.dmp
          Filesize

          2.3MB

        • memory/4780-133-0x0000000000400000-0x000000000042C000-memory.dmp
          Filesize

          176KB