Analysis

  • max time kernel
    131s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2023 22:25

General

  • Target

    Filmora9/Filmora.exe

  • Size

    143KB

  • MD5

    2b5f1a573ecaeaa00157c594fb507995

  • SHA1

    3b7a29cf0081d735741efcd9384b23de64e12338

  • SHA256

    5ec69ddfad63216095655cfd621865c83641d559ba8c749e1c937e4561dcab7e

  • SHA512

    988ddeb6cd9c1616963382bf75b06bee19931db03a18acb7050ffcd512146815c6eaa31f2f53ad319052e3569892b86bb9d29c3e65253e50b28e74ae74538b95

  • SSDEEP

    1536:z9DsEqyI866rxALJTYI91KaU+zc2Xpp8eNptWGkUnTs2ZBpki0g16E9azjXCAAk9:ZFpIStG31Kn4zTPNkGEzjSIneTX02202

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Filmora9\Filmora.exe
    "C:\Users\Admin\AppData\Local\Temp\Filmora9\Filmora.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\Filmora9\Wondershare Filmora9.exe
      "C:\Users\Admin\AppData\Local\Temp\Filmora9\Wondershare Filmora9.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D9Test.exe
        C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D9Test.exe 4
        3⤵
          PID:1856
        • C:\Users\Admin\AppData\Local\Temp\Filmora9\GLTest.exe
          C:\Users\Admin\AppData\Local\Temp\Filmora9\GLTest.exe 3
          3⤵
            PID:1904
          • C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D11Test.exe
            C:\Users\Admin\AppData\Local\Temp\Filmora9\D3D11Test.exe 5
            3⤵
              PID:1640
            • C:\Users\Admin\AppData\Local\Temp\Filmora9\oclTest.exe
              C:\Users\Admin\AppData\Local\Temp\Filmora9\oclTest.exe --blacklist C:\Users\Admin\AppData\Local\Temp\Filmora9\opencl_black_list.xml --whitelist C:\Users\Admin\AppData\Local\Temp\Filmora9\opencl_white_list.xml
              3⤵
                PID:2000

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Filmora9\Log\NLELog.txt
            Filesize

            1.1MB

            MD5

            4e743b30c8b8748818be9351f5326ecf

            SHA1

            ea360a074e31e6b2a3d656e75ea880a5ee802ec0

            SHA256

            efa7615a648964717888a04b6247feacb1febaf484bee9e0a3513d361e2ec168

            SHA512

            60f05002580268e39da2df5cab0d4313f8bf9c09312c53374208e3ccb7604096266da05afd6118b76e0791352792c58d56fbbe512fd92be75f2cd71fdbdb01e4

          • C:\Users\Admin\AppData\Local\Temp\Filmora9\log\NLELog.txt
            Filesize

            1.1MB

            MD5

            4e743b30c8b8748818be9351f5326ecf

            SHA1

            ea360a074e31e6b2a3d656e75ea880a5ee802ec0

            SHA256

            efa7615a648964717888a04b6247feacb1febaf484bee9e0a3513d361e2ec168

            SHA512

            60f05002580268e39da2df5cab0d4313f8bf9c09312c53374208e3ccb7604096266da05afd6118b76e0791352792c58d56fbbe512fd92be75f2cd71fdbdb01e4

          • memory/1488-79-0x000007FEBD5C0000-0x000007FEBD5D0000-memory.dmp
            Filesize

            64KB

          • memory/1488-80-0x00000000373C0000-0x00000000373D0000-memory.dmp
            Filesize

            64KB

          • memory/1488-58-0x000007FEF2800000-0x000007FEF2B21000-memory.dmp
            Filesize

            3.1MB

          • memory/1488-59-0x000007FEF0C20000-0x000007FEF104B000-memory.dmp
            Filesize

            4.2MB

          • memory/1488-60-0x000000013F560000-0x000000013F93E000-memory.dmp
            Filesize

            3.9MB

          • memory/1488-61-0x000007FEEF040000-0x000007FEEF286000-memory.dmp
            Filesize

            2.3MB

          • memory/1488-64-0x00000000028F0000-0x0000000002A99000-memory.dmp
            Filesize

            1.7MB

          • memory/1488-72-0x00000000027B0000-0x000000000281C000-memory.dmp
            Filesize

            432KB

          • memory/1488-111-0x0000000001DE0000-0x0000000001DEA000-memory.dmp
            Filesize

            40KB

          • memory/1488-57-0x000007FEEF7A0000-0x000007FEEFE97000-memory.dmp
            Filesize

            7.0MB

          • memory/1488-56-0x000007FEF6870000-0x000007FEF6A9A000-memory.dmp
            Filesize

            2.2MB

          • memory/1488-55-0x00000000740A0000-0x00000000745E2000-memory.dmp
            Filesize

            5.3MB

          • memory/1488-105-0x0000000001DE0000-0x0000000001DEA000-memory.dmp
            Filesize

            40KB

          • memory/1488-104-0x0000000001DE0000-0x0000000001DEA000-memory.dmp
            Filesize

            40KB

          • memory/1488-109-0x0000000062480000-0x000000006249F000-memory.dmp
            Filesize

            124KB

          • memory/1488-108-0x0000000064800000-0x0000000066293000-memory.dmp
            Filesize

            26.6MB

          • memory/1488-110-0x000007FEEF040000-0x000007FEEF286000-memory.dmp
            Filesize

            2.3MB

          • memory/1488-112-0x0000000001DE0000-0x0000000001DEA000-memory.dmp
            Filesize

            40KB

          • memory/1696-54-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB