Analysis
-
max time kernel
271s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2023, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
FabFilter - Total Bundle/R2R/FabFilter_KeyGen.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FabFilter - Total Bundle/R2R/FabFilter_KeyGen.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
FabFilter - Total Bundle/Setup FabFilter Total Bundle v2018.02.22.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
FabFilter - Total Bundle/Setup FabFilter Total Bundle v2018.02.22.exe
Resource
win10v2004-20230220-en
General
-
Target
FabFilter - Total Bundle/R2R/FabFilter_KeyGen.exe
-
Size
860KB
-
MD5
72be38542e02fee398987398f1f93fba
-
SHA1
376db72305a2b5623e1d548fc4b7853e53329559
-
SHA256
1ff6fce352e865268407d54fdcb1c739b744f6a0dc81e29ff497ae8b7ea2cc4f
-
SHA512
94e81b69bb8ac69eec50c4d6ab768fdba99e07cac4a68910ac35d00d62e2178325ca6761591669891b436c029a2fcb261807db733882f3be490e3576d8893a21
-
SSDEEP
12288:Wo6c9t2SllyLELib6VmssxSsG0S2WSPOr3KNklwPQ9Ujka0KMeCt5GU/xupxBCYI:Wo6cLU8Psx1xISaKNklwPBb0KcJup6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1336 keygen.exe -
Loads dropped DLL 4 IoCs
pid Process 1520 FabFilter_KeyGen.exe 1520 FabFilter_KeyGen.exe 1336 keygen.exe 1336 keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1336 keygen.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1336 1520 FabFilter_KeyGen.exe 28 PID 1520 wrote to memory of 1336 1520 FabFilter_KeyGen.exe 28 PID 1520 wrote to memory of 1336 1520 FabFilter_KeyGen.exe 28 PID 1520 wrote to memory of 1336 1520 FabFilter_KeyGen.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FabFilter - Total Bundle\R2R\FabFilter_KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\FabFilter - Total Bundle\R2R\FabFilter_KeyGen.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\keygen.exeC:\Users\Admin\AppData\Local\Temp\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
233KB
MD5098c88aa084267d7e53b3fa4093e20cb
SHA1ef0e6f63c79da0f144431deb972068fbe0e223e7
SHA256638193931a8e47a7a3e595efd25e410aca85de03ebf38b0cd730bcba7e6ee78d
SHA51264512a98987d4a942979c1686ccfd537e1130d656779dba1fd432e55c1e9ec49d811b958f47bd347e9f01b030c87c91b70de3a8124ead3b87598ec2b49451731
-
Filesize
80KB
MD55e3c083251880c635f5ea6a0a6ed8e76
SHA1e7fb44133e223140057243493159bdce01c5f080
SHA2569d460a48d7f7f461967c9065182456871606eef1c27f21767335b7d81384e141
SHA512b4a6a5ad71a13f51989e1fccedb542ab528f6ab9bc3d60a4c93c59e544b8eaa06ca7b9fe79c1d9a5c92b61345c18e38736561cd21426bc9e43ae3a4c59424284
-
Filesize
512KB
MD584dedafe1278c895381af0f26e170a7d
SHA1d6ea7cb2881b72d7d4b898fe0fce47d987456f25
SHA256673bd99022a16a8fa1d7bccc89fe13946c90c0c85b20da4b0808d9194ce26016
SHA512030ab2524c971922805335dca97a75cc70e54fa12ffacc395bbe9077f7289411f4bfbd22c3b7111cc19112334cb3cc1827eb80098c3a690e8e320acc9a6898e4
-
Filesize
512KB
MD584dedafe1278c895381af0f26e170a7d
SHA1d6ea7cb2881b72d7d4b898fe0fce47d987456f25
SHA256673bd99022a16a8fa1d7bccc89fe13946c90c0c85b20da4b0808d9194ce26016
SHA512030ab2524c971922805335dca97a75cc70e54fa12ffacc395bbe9077f7289411f4bfbd22c3b7111cc19112334cb3cc1827eb80098c3a690e8e320acc9a6898e4
-
Filesize
512KB
MD584dedafe1278c895381af0f26e170a7d
SHA1d6ea7cb2881b72d7d4b898fe0fce47d987456f25
SHA256673bd99022a16a8fa1d7bccc89fe13946c90c0c85b20da4b0808d9194ce26016
SHA512030ab2524c971922805335dca97a75cc70e54fa12ffacc395bbe9077f7289411f4bfbd22c3b7111cc19112334cb3cc1827eb80098c3a690e8e320acc9a6898e4
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
233KB
MD5098c88aa084267d7e53b3fa4093e20cb
SHA1ef0e6f63c79da0f144431deb972068fbe0e223e7
SHA256638193931a8e47a7a3e595efd25e410aca85de03ebf38b0cd730bcba7e6ee78d
SHA51264512a98987d4a942979c1686ccfd537e1130d656779dba1fd432e55c1e9ec49d811b958f47bd347e9f01b030c87c91b70de3a8124ead3b87598ec2b49451731
-
Filesize
512KB
MD584dedafe1278c895381af0f26e170a7d
SHA1d6ea7cb2881b72d7d4b898fe0fce47d987456f25
SHA256673bd99022a16a8fa1d7bccc89fe13946c90c0c85b20da4b0808d9194ce26016
SHA512030ab2524c971922805335dca97a75cc70e54fa12ffacc395bbe9077f7289411f4bfbd22c3b7111cc19112334cb3cc1827eb80098c3a690e8e320acc9a6898e4
-
Filesize
512KB
MD584dedafe1278c895381af0f26e170a7d
SHA1d6ea7cb2881b72d7d4b898fe0fce47d987456f25
SHA256673bd99022a16a8fa1d7bccc89fe13946c90c0c85b20da4b0808d9194ce26016
SHA512030ab2524c971922805335dca97a75cc70e54fa12ffacc395bbe9077f7289411f4bfbd22c3b7111cc19112334cb3cc1827eb80098c3a690e8e320acc9a6898e4