Overview
overview
7Static
static
35a944feecd...0b.exe
windows7-x64
75a944feecd...0b.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...c3.dll
windows7-x64
3$PLUGINSDI...c3.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
5a944feecdf69470ff59cd083c127e0b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a944feecdf69470ff59cd083c127e0b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc3.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc3.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
General
-
Target
5a944feecdf69470ff59cd083c127e0b.exe
-
Size
237KB
-
MD5
5a944feecdf69470ff59cd083c127e0b
-
SHA1
960beb57a69b92a86e860e89418699dbe4d056c0
-
SHA256
06f4dc7898f8e326c62cdf78d94a43957259a6548f98eec0f040f5f00f822ae0
-
SHA512
274c95dcb1e5b44e19b7a0196839ddaaf7872468e485831ba926d3be017810373af6988576c33ab35dfd1c453f0dff1e81f2f5951a72113535b2979e3ba8b0ff
-
SSDEEP
6144:FQqg1wdmKWMrvcjtq1pcJGUg1ZoNEiti0tdKiti0G:k1w8yrEp6c8UgzqXdBk
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\1ClickDownload\SellYourGF_-_Sold_and_double_cumsprayed_[720p].mp4.torrent.gz 5a944feecdf69470ff59cd083c127e0b.exe File created C:\Program Files (x86)\1ClickDownload\gzip.exe 5a944feecdf69470ff59cd083c127e0b.exe File created C:\Program Files (x86)\1ClickDownload\mainpacklt.exe 5a944feecdf69470ff59cd083c127e0b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe 1336 5a944feecdf69470ff59cd083c127e0b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
16KB
MD5f642e8cfce23aa5d124533357de7394b
SHA180ce98a2bc4b416db357ea52a74424d742cfaa55
SHA256f1bed304ea1d96094c1e4e3f8e112b7ce15af4441192e73c9144f774ad132d2e
SHA512d0ec47e3a69cc6c6f54e8ba58cade7875ace43b66946e7bd4b678dc246c61acf8d36aeaf80082308f08783c28424c5db601bdde1d820f7797b60ca4fe948ad26
-
Filesize
25KB
MD59d8ce05f532dc7b5742831ec8a63c2d8
SHA1b014365f723c78a84bcdf8a46cfa016eb2b8dbc5
SHA256fcc46c2e60931a76fe529a9fa5a85ba2f4bf7907d651161f92fc524ac4747982
SHA51298f268bebf0c82d019873a7b109e1822011c0532e6a6d8ba94d2b8a918d9558f4db89100b6ee357c9c510ff56adc349e619489fd7e8d21e7f826877185ede3fe
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e