Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 03:20

General

  • Target

    $TEMP/mp3tubedownloader-tb-setup.exe

  • Size

    522KB

  • MD5

    7527ab5ac2c6e787c4e3f2aa3b18ccc0

  • SHA1

    a8592be06f5bb8e46b143d13ea3b10762e85e6de

  • SHA256

    7e29d985209500f030d5ce5fe6a2c4ab2229d42eadee1b7fb66953967aecd911

  • SHA512

    2025878ea1f605a1da0d798992d820ba27d528f8dc4427f903a2e9c2d3c54a464dd69fe674c6f7b9efdb814f1de0119e61d9bbe650918134d4e38f55c7fdbd96

  • SSDEEP

    12288:ITjIznvFsLpsTreHcJ8CFfGPDKRU+S+3HtqQ0AS3:I6NfNo4USPjS3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 61 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\mp3tubedownloader-tb-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\mp3tubedownloader-tb-setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
      "Mp3TubeDownloaderSvc.exe" -i
      2⤵
      • Executes dropped EXE
      PID:2040
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
      "Mp3TubeDownloaderSvc.exe" -r
      2⤵
      • Executes dropped EXE
      PID:3352
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:2668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4464 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1936
    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe
      "C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe
        "C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe" 8ea61f6331159b5e9a4c290d1dfc4bcb
        2⤵
        • Executes dropped EXE
        PID:2324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloader.exe

      Filesize

      180KB

      MD5

      717a59b3e58b0bf9cd39a2f00f370546

      SHA1

      8850091309e738bc9b4ad16381c27c40152c367b

      SHA256

      602a0eb7be172180979c197b0340d278bf5494cea7d5e41b9802e721c98d8360

      SHA512

      4ee1857a214caad7dbaa85d50c5c34f5111b474c89100282ad5f5eebe141c3cb057e0bee815b6dfd5f35e441b22cb7421fe18d4600ad9e0a672482ac978fed16

    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\Mp3TubeDownloaderSvc.exe

      Filesize

      156KB

      MD5

      ecaf84c10b0f4e12a3f2108b83ae8557

      SHA1

      4f42ed7e1db1610f886385ec82147e5e2eaccb4b

      SHA256

      41d8e857e83a4c2d4ecbf75f3b759bf7cef858362dca0558f3b65262aa89eb30

      SHA512

      e5c56216be01696519cb058158276d671066bf6fd445faa83b6b26fa2b7b710a4c3675daea716e05660fc7adc469fc7df07edcf9a309cfa7c87412b33622fe09

    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\mp3tubedownloadertb.dll

      Filesize

      832KB

      MD5

      47e26874cfa4d87c8e48f091cc4a0310

      SHA1

      867422a36588a5e34bb014ca147b59501073f955

      SHA256

      ef712124cf2db02bd2642a0359b416fea7e55810bc65592612116c64d04c3183

      SHA512

      2415a3cbe657c0704cc84a9de7131dd9f70a6ec24f9af0db765c345881f3ef79bed08e91011e0830df08119d7c93decaf0cb1851c52ee31eda976968090f306f

    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\mp3tubedownloadertb.dll

      Filesize

      384KB

      MD5

      71092ab23221ef18945cb7a195f57fb6

      SHA1

      bab21730c0f139b9b593c8808254bb606edd8a35

      SHA256

      bcb65fcde16816ddd0b75f4b90cb28b7e180b1b00c409df86b0de7ee2d10b1df

      SHA512

      b9a53352728aaae20a2d0586cb14e108a87ae5481fd56d8e3a48d2cef5124daad882631090ce0ac9d018a279921af9be7ebbf060e053915d9cde04c5d8dc7d94

    • C:\Program Files (x86)\Mp3TubeDownloader Toolbar\mp3tubedownloadertb.dll

      Filesize

      64KB

      MD5

      84175a8163f3e561ebcfe38ca9da75da

      SHA1

      bf2e5e0191b4ed06b4017765cf69976d0248b6e7

      SHA256

      25c8cdd339e8081d643880d7d0604bc9de13410a7b69a65a189d41546b5f2a49

      SHA512

      bd1a43b1a2d8dbf2280fb8233078ff69e24dbce8b8d8d73a744506aec600eb12c7193205ae5d06ef2d5724854935ba41eaaa4fa0fd60f486c4b83aed6f488fea

    • C:\Users\Admin\AppData\Local\Temp\nsd4373.tmp\System.dll

      Filesize

      10KB

      MD5

      fe24766ba314f620d57d0cf7339103c0

      SHA1

      8641545f03f03ff07485d6ec4d7b41cbb898c269

      SHA256

      802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd

      SHA512

      60d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3

    • memory/4144-90-0x00000000030A0000-0x000000000318F000-memory.dmp

      Filesize

      956KB