Analysis

  • max time kernel
    101s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2023 19:08

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbS10UDBacDJaZDVpczl2UU9FRFhuaUhWbXpLZ3xBQ3Jtc0tudUtyWlJmLVVFWTBaaUZiWGxNVmROSnVtdk4yajhGVW1JQVlnTENzZzlqaXZXSVlDUDhkTkVFXzdZaEJmMTFHSEF4ckdYQm1mQzI1Tm1RVkQ2d2M0VWlYTDJvMTlmdm1ITjFTTWg3Vkprb0J2Y2pqUQ&q=https%3A%2F%2Fwww.mediafire.com%2Ffile%2F91f8cci743atgwa%2Finstalls64pcworldpro.rar%2Ffile&v=xj5kjcXzNzI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbS10UDBacDJaZDVpczl2UU9FRFhuaUhWbXpLZ3xBQ3Jtc0tudUtyWlJmLVVFWTBaaUZiWGxNVmROSnVtdk4yajhGVW1JQVlnTENzZzlqaXZXSVlDUDhkTkVFXzdZaEJmMTFHSEF4ckdYQm1mQzI1Tm1RVkQ2d2M0VWlYTDJvMTlmdm1ITjFTTWg3Vkprb0J2Y2pqUQ&q=https%3A%2F%2Fwww.mediafire.com%2Ffile%2F91f8cci743atgwa%2Finstalls64pcworldpro.rar%2Ffile&v=xj5kjcXzNzI
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1500
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3484
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\installs64pcworldpro\" -spe -an -ai#7zMap7417:102:7zEvent10487
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3036
    • C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe
      "C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civilnaturov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civilnaturov.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3704
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          3⤵
            PID:3368
      • C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe
        "C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\civilnaturov.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\civilnaturov.exe
          2⤵
            PID:1608
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
              3⤵
                PID:844

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\DFUBOOOL\www.mediafire[1].xml

            Filesize

            1KB

            MD5

            3d84b73cd2448a584f5f82a987c4f719

            SHA1

            2161ef88766b1bb37cd23df9ed077232e7d0c109

            SHA256

            9bbdca019706133056e159c095a2197d1555256b4ce0e15a045c3713442ab532

            SHA512

            b5ea9c86e6a1207170d8263ab9c3d480a9facd0f79bf8841e77a64d026ca88dcffe788fe1fb253a68d81eeb93e084bd82e0bfc3bd30f66d690eada3098ec4c33

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dcpq11e\imagestore.dat

            Filesize

            478B

            MD5

            ea20896eed28f479964cd92c011f34ab

            SHA1

            f8f08d90bf84b8d0305cf7e4e5f76e1600a9682a

            SHA256

            56d7e2605a579d7c8584cb389da6bd84c3198a04c581e891c1e87ee5d1c1270e

            SHA512

            791b9c46f76f11901144a7603886f34d3677df6c16eceddad8fdf81d874112451c8b03bb8e84f77bba72a84cbef39c33eec23110140785440a9434be44b3a011

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S64KWKX9\favicon_32[1].png

            Filesize

            348B

            MD5

            3a880420311ad60097059ffc0fc53393

            SHA1

            7644b902864c4ba3604f61e0880e05da15ab464f

            SHA256

            571c382651d6337cd5fa49c512d02f0f99d523a896b87175fb59c710e1fcbc7a

            SHA512

            c16652970d04b7b76f7e7ef5a8d091984a13406cf7f5475cc3cfa3ecae3278c19be5494be39a8e549978b0675d1c70f69cc1413de9240487943d91965aff17d1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civilnaturov.exe

            Filesize

            109.4MB

            MD5

            ceb0d5fa4036a32c38929e26099c30ae

            SHA1

            24d9628ad2669dcdea1562f9b78c0a6d161c1060

            SHA256

            39fa68bd6c9cb7aefbaf3ddfede40bf97e5bb471b2c495f2c899b3fc59973a72

            SHA512

            13617f73f0025a8dbc7445812b7fb621f9970f885ae523dca957564d41e062f1dc1635f6980e05e20ae1fc3ea36ccf96a65cd1f08790f2bcd2156deb16282445

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civilnaturov.exe

            Filesize

            109.7MB

            MD5

            2299aab6da063889e51b03cffb722e0c

            SHA1

            1150608fcb42ab2ce892772a16bc176fced8321a

            SHA256

            9ba7d5bbb371e53bb7ba2d6db1a1c9ec170da9b6bb67f6d9101cd18f2672fc9a

            SHA512

            02abb3c914095c4e5ce67730ccedbb5bc89bd02d9440beeb2849cb9927ad931e45e5247e3044c0510a5d038a48e37f21b2ae8fc3aaf39edbc7bfd6bcc0353b8d

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civilnaturov.exe

            Filesize

            112.4MB

            MD5

            b9a8932d8442dc14f38580269fcacefa

            SHA1

            ca12e6c42ceba0868dafa6a89a6d1249995cff27

            SHA256

            528e8414ce62a47c58e41b0928148379e979a99b2b2b3808b878e38f785af3e9

            SHA512

            48053b80f193403c54c323b69f6fccd24d76d90955674a82cf22e959e7892e1b3ea504d8fa150c2d79405414f5d934713739ac82c846b76cc4e3e73b28e72fcb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\civilnaturov.exe

            Filesize

            86.6MB

            MD5

            46a51285c4d8f97e7abab8f85acfb647

            SHA1

            9f4f358b193b5cca3dd3bea8b5da390f40debe84

            SHA256

            038ea49209ed5584a348cf1139666acc0246048361166545eefedf564d94b62a

            SHA512

            32fd101d4465c825ae2e3e4646edba07720911bc3a472cb576dea5d630bf26e1cdb0d373040ee3851961a6233d7debe8b2dc6a36ef87657704d0cac46c3255cd

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\civilnaturov.exe

            Filesize

            87.4MB

            MD5

            aa110e8326f5c8930f93e6f21c28c403

            SHA1

            4a951d13fa362e904f0538b4d9ccaa41e2255aa7

            SHA256

            754b046155567e041237236a856241c64d0547ef67ff5aec080e0d62ab2f4f74

            SHA512

            6adb3d26f562df405eaafc966a314783cea7fb5f9a1d41b456778ba6152aa9b8755bafc027d52ce86a1d1a20291ae2f3c096ff31d2a9c8615a7702827c882cd5

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qln4f4xx.sdq.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\~DF472E00209535EA0E.TMP

            Filesize

            16KB

            MD5

            b41011087b3bed62863c27db420212a4

            SHA1

            2eb4923b058c07969abc33a33494d4a88f701518

            SHA256

            5fec2031629c9c536d37a0fcd4395c312c0dd38e906737e305651af3ac4b33bc

            SHA512

            c2529c48146c0a8bd1bfc68f1bafa0a9722b47707b69a67678fefbc77d77aa7a5be8afd9d00b491cadaab407809b4225cfa3ca282a3be2bf78dddd0cc0a3c6e1

          • C:\Users\Admin\Downloads\installs64pcworldpro.rar.orrzrlp.partial

            Filesize

            37.3MB

            MD5

            52ca6180e246b095b7f6ddb6d57aff15

            SHA1

            d4a1e7256ad74f14fe2511baf49bccf39c5f3364

            SHA256

            056dadba3905f61bc75412eb0ecc46e18bdd63fb7c88805370316cd0f4a6fa85

            SHA512

            1c58309b008e357f06508b7399e045a609aa2b817b2426ef44e33dbc8dc582e8f59c434aeea3da1e354438d5de71bfaf318915ed730a1c35b96770b619cc3f77

          • C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe

            Filesize

            291.0MB

            MD5

            96c4381b75029599f8d4b6e6c130e287

            SHA1

            1638415f16a28209ef2860795ed7eee0037dfb17

            SHA256

            ff0846ed9e2d9dd962f36b8494c1278d01e87f72b445a92555cdd78b349fd2d2

            SHA512

            fd8f41e3b4a0ff0e4b9d9eea73de2e8abd9cc4fbf1c09ad98d13994e09343ed5837928a9e7e38953e55727b9e1e444a52bc48d45a9ad141a1fea0a35a9d341ac

          • C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe

            Filesize

            285.7MB

            MD5

            d88a7ed211b15e30af24a2d9d3d36ec3

            SHA1

            c307f299f5f673cac71c272a9aa408e767b55a93

            SHA256

            711c46a586ec7ef2158a3d4b2e4b4d2c34fc662dc55fbc4fe1827f80b1138f18

            SHA512

            caff1c0cd1706a0f784126b2570be816125b41ca895dfda4dcc0f1ff423203c050dc300e3878eeded027bdd51a09d4cae328a43776b726359b13031893350798

          • C:\Users\Admin\Downloads\installs64pcworldpro\Installx64.exe

            Filesize

            189.9MB

            MD5

            5e71d054155870d8e391d7f8eb05d18c

            SHA1

            98872a6ada0c18617076039f23d73cf09560b1ef

            SHA256

            bfaca1ea888d02b3859a09b53ed7e33013cb50f8fbcbaec0f4e2e2a51eb01aa1

            SHA512

            d8ad36a491b4e71428df8118c755e4b3177b109cfd944673bc0ff25b09404753eaceeb862191636b0406cae8f7cd1f8784a62532072f0ab8fb6527a6121920fc

          • C:\Users\Admin\Downloads\installs64pcworldpro\med\App\DiffImg\test\img1\yuv\tulips_yuv444_prog_planar_qcif_176x144.yuv

            Filesize

            445KB

            MD5

            0eadafd0e08e19c9ddae64185076706a

            SHA1

            0b9f6bfc88139e6ced5fcde15edc68a51556ea8b

            SHA256

            821528d4d1cfddfa314d6e8d1d85ee4520dd3f4c13650fcd71c9e17ec32a02fb

            SHA512

            b948897ffc0dfaf0f116d63f677a5656dd37a640e49de59c44b9f8b2e76c8ea6857025519094a5ee886cec9b9edc6e65d2bb82ae1518500da96b1fb1a5825d4b

          • memory/844-550-0x0000000001230000-0x0000000001240000-memory.dmp

            Filesize

            64KB

          • memory/844-549-0x0000000001230000-0x0000000001240000-memory.dmp

            Filesize

            64KB

          • memory/844-555-0x0000000001230000-0x0000000001240000-memory.dmp

            Filesize

            64KB

          • memory/1608-527-0x0000000004A80000-0x0000000004A90000-memory.dmp

            Filesize

            64KB

          • memory/1608-569-0x0000000004A80000-0x0000000004A90000-memory.dmp

            Filesize

            64KB

          • memory/3368-539-0x00000000059E0000-0x00000000059FE000-memory.dmp

            Filesize

            120KB

          • memory/3368-568-0x0000000002140000-0x0000000002150000-memory.dmp

            Filesize

            64KB

          • memory/3368-528-0x0000000005260000-0x00000000052C6000-memory.dmp

            Filesize

            408KB

          • memory/3368-529-0x00000000052D0000-0x0000000005336000-memory.dmp

            Filesize

            408KB

          • memory/3368-526-0x0000000002140000-0x0000000002150000-memory.dmp

            Filesize

            64KB

          • memory/3368-523-0x00000000020F0000-0x0000000002126000-memory.dmp

            Filesize

            216KB

          • memory/3368-524-0x0000000004BC0000-0x00000000051E8000-memory.dmp

            Filesize

            6.2MB

          • memory/3368-525-0x0000000002140000-0x0000000002150000-memory.dmp

            Filesize

            64KB

          • memory/3368-551-0x0000000002140000-0x0000000002150000-memory.dmp

            Filesize

            64KB

          • memory/3368-552-0x0000000007010000-0x000000000768A000-memory.dmp

            Filesize

            6.5MB

          • memory/3368-553-0x0000000005EF0000-0x0000000005F0A000-memory.dmp

            Filesize

            104KB

          • memory/3368-567-0x0000000002140000-0x0000000002150000-memory.dmp

            Filesize

            64KB

          • memory/3704-517-0x00000000004F0000-0x0000000000538000-memory.dmp

            Filesize

            288KB

          • memory/3704-554-0x00000000027F0000-0x0000000002800000-memory.dmp

            Filesize

            64KB

          • memory/3704-518-0x00000000027F0000-0x0000000002800000-memory.dmp

            Filesize

            64KB

          • memory/3704-519-0x00000000064F0000-0x0000000006512000-memory.dmp

            Filesize

            136KB