Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe
Resource
win10v2004-20231023-en
General
-
Target
FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe
-
Size
995KB
-
MD5
bfd3a7b90916948baa130eaa72d0cbc5
-
SHA1
9129d612ddb11ac611fe8daeed4947db72653031
-
SHA256
89c63da10876200e525b11c6fa4f9b8896185bb92feb96ba56a4918434481535
-
SHA512
b9a92de1de352aa9d765f47847320605727b060f930d476e23614909878427851e65e0849a5deb49103b673a75e1192c79bec2e5dad51ff0d28c1a66e26e6c9b
-
SSDEEP
12288:SSxG0lssKssVs91x888888888888W88888888888LY1e0mXtlNszhSvsvXBIJ3Hi:ZxGOjYOtlvvsvXB+3HI1Vsr3M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp -
Loads dropped DLL 3 IoCs
pid Process 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 39 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 42 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 46 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 928 wrote to memory of 5108 928 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe 86 PID 928 wrote to memory of 5108 928 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe 86 PID 928 wrote to memory of 5108 928 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe 86 PID 5108 wrote to memory of 3308 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp 97 PID 5108 wrote to memory of 3308 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp 97 PID 5108 wrote to memory of 3308 5108 FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe"C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\is-JROOA.tmp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp"C:\Users\Admin\AppData\Local\Temp\is-JROOA.tmp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp" /SL5="$901CA,492391,402432,C:\Users\Admin\AppData\Local\Temp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C "ver > "C:\Users\Admin\AppData\Local\Temp\is-HIVOF.tmp\~execwithresult.txt""3⤵PID:3308
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5109e73481165f75361514240d3a95299
SHA1babfc67686a998945b14859044626298e67f777a
SHA2562261f0a35c85e398b294f93582001862aeb9536456a8ed4aaa08b91c69771e77
SHA512d49806975210143045389d88a9aff66d92906fd90892fff3cc5cdb08366b118001d8f147ba312a561fa383d827dc3a9c657886e82555af1e4b704fbebf9d9aaa
-
Filesize
77KB
MD5b4efe1200f09cbf02f0d2ae326a84f3b
SHA183102a7f5465a14c78d04ca6d8703c68a5c599ce
SHA2566bd9984dd28ce8cc13e8eb3b5ee9f6c8a6967e3b2288918665e2ae67fa1eb56b
SHA51214c83df5ca8ce92efddb07bda1c6fff9cfbbfb1348ff6c2e6b523110bb1fd10023e09986bc7967824a5cf37789080d81f2a5deedc3df3925825f73e2a87b52a6
-
Filesize
77KB
MD5b4efe1200f09cbf02f0d2ae326a84f3b
SHA183102a7f5465a14c78d04ca6d8703c68a5c599ce
SHA2566bd9984dd28ce8cc13e8eb3b5ee9f6c8a6967e3b2288918665e2ae67fa1eb56b
SHA51214c83df5ca8ce92efddb07bda1c6fff9cfbbfb1348ff6c2e6b523110bb1fd10023e09986bc7967824a5cf37789080d81f2a5deedc3df3925825f73e2a87b52a6
-
Filesize
47B
MD51a1ea0c1a7df5f91ecd62cda837a3273
SHA1f358bcfc14b04949db83e04c4e181f526b3fc5f3
SHA2569fea0616868155973e2b5ca5d1524359e47916e8aee14dfad123b533c737ee76
SHA512666a013157c5544ef7ebad000d6a5e0f2b4020bb7e7d8792880b7c35c662b1c710e25a8893f75b8599cba5bb934c18f91a689f0f24c53b287e601475b1ae9f01
-
C:\Users\Admin\AppData\Local\Temp\is-JROOA.tmp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp
Filesize1.4MB
MD57e4aa70d53b36013428377346e0e268c
SHA1b45756feef67b76d1d0caa459f035c3c115d4b0e
SHA256642553254d18fbca9150d18b8189a502fed5f9e625a7fc58d3aafabb16a76893
SHA5121b23c1f532327c3006225f345251a907875699c063bc3a47843b8ceb67b473f5404d4df50543a15d6fac002c7109eaa155c0f00c017182b93d71208e6e3180b8
-
C:\Users\Admin\AppData\Local\Temp\is-JROOA.tmp\FreemakeVideoDownloaderSetup_ac990394-6077-bdce-6a8c-d1de8ed2575f.tmp
Filesize1.4MB
MD57e4aa70d53b36013428377346e0e268c
SHA1b45756feef67b76d1d0caa459f035c3c115d4b0e
SHA256642553254d18fbca9150d18b8189a502fed5f9e625a7fc58d3aafabb16a76893
SHA5121b23c1f532327c3006225f345251a907875699c063bc3a47843b8ceb67b473f5404d4df50543a15d6fac002c7109eaa155c0f00c017182b93d71208e6e3180b8