Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
DivXCodec682Beta1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DivXCodec682Beta1.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
DivXCodec682Beta1.exe
-
Size
3.2MB
-
MD5
8896e70cf81bb56c2e4ca045ad750a9b
-
SHA1
4921376ff84e6478ee7bc489b4ffbb3ab21f7976
-
SHA256
9299b91e3d978e274e6c2dbc020238d0761bf11e7ed7ccc2a8ddeb3c042fac3a
-
SHA512
02e35df04e10164b9016a60db76e20c2849dad191b7c38bf5576efa516ad0ec31524f791818a5bb6e7a5aec09a1dfbb622d72359ef4a222cc7a80a0a3b485f32
-
SSDEEP
49152:H8rmj6HKpY4mMM8PAYOGGU+vwwyW4iC3P8qHdKb8aT85+hTUF6PKgP6Uy:HqmKK5jM8PgG2IwYTHdKb8aTU5FF5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2596 DivXComponent.exe 2912 DivXConnectionTester.exe -
Loads dropped DLL 9 IoCs
pid Process 2000 DivXCodec682Beta1.exe 2000 DivXCodec682Beta1.exe 2000 DivXCodec682Beta1.exe 2000 DivXCodec682Beta1.exe 2912 DivXConnectionTester.exe 2912 DivXConnectionTester.exe 2912 DivXConnectionTester.exe 2912 DivXConnectionTester.exe 2912 DivXConnectionTester.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe 2596 DivXComponent.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2912 DivXConnectionTester.exe Token: SeBackupPrivilege 2912 DivXConnectionTester.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2596 2000 DivXCodec682Beta1.exe 2 PID 2000 wrote to memory of 2596 2000 DivXCodec682Beta1.exe 2 PID 2000 wrote to memory of 2596 2000 DivXCodec682Beta1.exe 2 PID 2000 wrote to memory of 2596 2000 DivXCodec682Beta1.exe 2 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1 PID 2000 wrote to memory of 2912 2000 DivXCodec682Beta1.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\nso6C5C.tmp\DivXConnectionTester.exe"C:\Users\Admin\AppData\Local\Temp\nso6C5C.tmp\DivXConnectionTester.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\nso6C5C.tmp\DivXComponent.exeC:\Users\Admin\AppData\Local\Temp\nso6C5C.tmp\DivXComponent.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
C:\Users\Admin\AppData\Local\Temp\DivXCodec682Beta1.exe"C:\Users\Admin\AppData\Local\Temp\DivXCodec682Beta1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c0d23f9dd2f29b0ab20f2005b29b6a12
SHA1412b1ff53c9d5d390d344787541450e091ea502b
SHA256fcbf18736b567fff8839023bb1c3acb11a61ac58cee83e08cd40d333a1e13fe6
SHA51275986c332c97397dd2ac6905a5ed03cee2b92c187ba2600c4c5eadede3333e166c0e0f3fd9f2a4fe1a36319596d20d93a4371b751c20929cbffed8b54f613744
-
Filesize
10KB
MD5ed228603bf5d6ba382b59274dba35a0a
SHA1037d40e0399902b5119d48995dfd2e96bc6de9a4
SHA256a1bada98dffbe23a96af2ce3f4df7d7927cec6ea0a1d2d1f77862fb117a74f37
SHA5129dabf495eaeb979235b7626c0619bb8eaab61c158e66799b1afdb1500952c789b7ea645a358c8961876e06a9ec168159ef405b6238ec692f1f89fc1ccb1e9ae9
-
Filesize
253KB
MD5765da8afd2f9f75a3d39f35d79772443
SHA149531fb01d41f6af3fe31f67e58a75e1f7dcb584
SHA256d1f0137cf37774adb2453eda1b15ead9f7c5a417af1269077d422ec4791fbdc5
SHA51287c4299e40f292091e47a2171f8d335f2fb4587a73dd7c2722684854cab4cd35e4327ed065ab3eeb284f1ea9aefda6a5a7c606fb376d39cee891e0765637e457
-
Filesize
80KB
MD5d1b411fc28aa7839bb236febc0950c96
SHA158c65d6501c16cb57cc7254d4292e6fd9deba2bb
SHA256d6088d64ea8d85e6439b0845b7ef1086403b3103f5a5e04e0d32a1f9f965b57b
SHA512be36614d0d07869bb94f3fe50454970ca7426fd19c6915687fd64a665bc84a015e745c4d7dcda0bf5bf3096820f9bd2a086ae313947bb064206f1a86f8fdf9ee
-
Filesize
5KB
MD56e78b62a574b8ef6fe3ad1ccbd46e327
SHA11b7b1edbbf39136cf36aa6198986a00a66b674d2
SHA256b7f02b15889971b80f3f9debd62ba7428e93d51b34239489e1bb899be446f28e
SHA512c7b77d68f821c0bd6943f1fcea5939d19ef07633e8b8b01383036669cdf89c52b4fd8a6a3197306a0f3ad52439beeb8d2afc29f2fa8bfeceb7942fd92daee17b