Analysis
-
max time kernel
159s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
httrack_x64-3.49.2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
httrack_x64-3.49.2.exe
Resource
win10v2004-20230915-en
General
-
Target
httrack_x64-3.49.2.exe
-
Size
6.5MB
-
MD5
599394f1470eef8c7a63e84a7de25e49
-
SHA1
03ac7f400a2f3546f4b0397f476e1823187c12b6
-
SHA256
276198e30803db7e1c567868cb302237b8a95b16fa2fb4e1ab607d880cf73ef4
-
SHA512
057e19e02c6a511f9c9cb5eb86e066166f50290cd5b6dea8da67026f9f4d441c1963e79973a73f391e5fe5db802ff3777d09d76add88209fb500a83441d7cec6
-
SSDEEP
98304:v0SqgwDyM8QYn+uL0yqSvXVQv9VKOerelNw7G7ToHRDzYqls6qp1a9b:v0Xgk98QYHLmiVgVKONKsExvls6oa
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1116 created 1232 1116 httrack_x64-3.49.2.exe 3 -
Executes dropped EXE 1 IoCs
pid Process 2232 SFJsWRj.exe -
Loads dropped DLL 5 IoCs
pid Process 1116 httrack_x64-3.49.2.exe 1116 httrack_x64-3.49.2.exe 2232 SFJsWRj.exe 2232 SFJsWRj.exe 2232 SFJsWRj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1116 set thread context of 2500 1116 httrack_x64-3.49.2.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2232 1116 httrack_x64-3.49.2.exe 30 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31 PID 1116 wrote to memory of 2500 1116 httrack_x64-3.49.2.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\httrack_x64-3.49.2.exe"C:\Users\Admin\AppData\Local\Temp\httrack_x64-3.49.2.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\SFJsWRj.exe"C:\Users\Admin\AppData\Local\Temp\SFJsWRj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\httrack_x64-3.49.2.exe"C:\Users\Admin\AppData\Local\Temp\httrack_x64-3.49.2.exe"2⤵PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081
-
Filesize
183KB
MD58eb83d03ac895bfc02605ffcf4638e48
SHA14652248cf75128893ae1e885d0ec0217fc25a5b4
SHA25634dd266b2ec7f77dae04bdcd14e82b0cf977e0c6cc689a1c8a49737bb18a86be
SHA512dbe9787c7f218826397ce53de01de33d3d3979aebed4030b6ec6af59d48c56362f9c8726af61655456c303444011619e0d88e50a630210020ad9c8db6c253081