Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 03:20

General

  • Target

    $TEMP/mp3tubedownloader-tb-setup.exe

  • Size

    522KB

  • MD5

    7527ab5ac2c6e787c4e3f2aa3b18ccc0

  • SHA1

    a8592be06f5bb8e46b143d13ea3b10762e85e6de

  • SHA256

    7e29d985209500f030d5ce5fe6a2c4ab2229d42eadee1b7fb66953967aecd911

  • SHA512

    2025878ea1f605a1da0d798992d820ba27d528f8dc4427f903a2e9c2d3c54a464dd69fe674c6f7b9efdb814f1de0119e61d9bbe650918134d4e38f55c7fdbd96

  • SSDEEP

    12288:ITjIznvFsLpsTreHcJ8CFfGPDKRU+S+3HtqQ0AS3:I6NfNo4USPjS3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 19 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 61 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\mp3tubedownloader-tb-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\mp3tubedownloader-tb-setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
      "Mp3TubeDownloaderSvc.exe" -i
      2⤵
      • Executes dropped EXE
      PID:2240
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
      "Mp3TubeDownloaderSvc.exe" -r
      2⤵
      • Executes dropped EXE
      PID:1920
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1008
  • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
    "C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe
      "C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe" 8ea61f6331159b5e9a4c290d1dfc4bcb
      2⤵
      • Executes dropped EXE
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe

    Filesize

    180KB

    MD5

    717a59b3e58b0bf9cd39a2f00f370546

    SHA1

    8850091309e738bc9b4ad16381c27c40152c367b

    SHA256

    602a0eb7be172180979c197b0340d278bf5494cea7d5e41b9802e721c98d8360

    SHA512

    4ee1857a214caad7dbaa85d50c5c34f5111b474c89100282ad5f5eebe141c3cb057e0bee815b6dfd5f35e441b22cb7421fe18d4600ad9e0a672482ac978fed16

  • \Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe

    Filesize

    156KB

    MD5

    ecaf84c10b0f4e12a3f2108b83ae8557

    SHA1

    4f42ed7e1db1610f886385ec82147e5e2eaccb4b

    SHA256

    41d8e857e83a4c2d4ecbf75f3b759bf7cef858362dca0558f3b65262aa89eb30

    SHA512

    e5c56216be01696519cb058158276d671066bf6fd445faa83b6b26fa2b7b710a4c3675daea716e05660fc7adc469fc7df07edcf9a309cfa7c87412b33622fe09

  • \Program Files (x86)\Mp3TubeDownloader Toolbar\mp3tubedownloadertb.dll

    Filesize

    928KB

    MD5

    cfcf25f560bf3fd86d7a7c78e12967d2

    SHA1

    d95569828f4e1d14f14aedeebd486d968a9152b8

    SHA256

    d0ad885cf83a5c72143c85d45edd2847cfaf6a67d023208b8eebd662db5212cd

    SHA512

    a28907c0a1feffce4e3751a06580510202148ee58093bb2da3c2712f19b561fc830f9783482124059647bf1a6c11f5ce5df5d1ab1486c909bc12405d17528921

  • \Users\Admin\AppData\Local\Temp\nst8097.tmp\System.dll

    Filesize

    10KB

    MD5

    fe24766ba314f620d57d0cf7339103c0

    SHA1

    8641545f03f03ff07485d6ec4d7b41cbb898c269

    SHA256

    802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd

    SHA512

    60d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3

  • memory/2620-88-0x0000000002A90000-0x0000000002B7F000-memory.dmp

    Filesize

    956KB

  • memory/2620-92-0x00000000004D0000-0x00000000004D2000-memory.dmp

    Filesize

    8KB