Overview
overview
7Static
static
771565589d5...3b.exe
windows7-x64
771565589d5...3b.exe
windows10-2004-x64
7torrent.exe
windows7-x64
7torrent.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...it.dll
windows7-x64
7$PLUGINSDI...it.dll
windows10-2004-x64
7babyloneula.rtf
windows7-x64
4babyloneula.rtf
windows10-2004-x64
1gunzip.exe
windows7-x64
1gunzip.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 03:32
Behavioral task
behavioral1
Sample
71565589d5b2c66b6e589030c4974a3b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71565589d5b2c66b6e589030c4974a3b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
torrent.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
torrent.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
babyloneula.rtf
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
babyloneula.rtf
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
gunzip.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
gunzip.exe
Resource
win10v2004-20231222-en
General
-
Target
71565589d5b2c66b6e589030c4974a3b.exe
-
Size
192KB
-
MD5
71565589d5b2c66b6e589030c4974a3b
-
SHA1
99297ae7319c91b352690413936bc7d692e44ad1
-
SHA256
43eb2374dc31192adcffed7aa530cdda54a6f7123ae312b5359104450b186db8
-
SHA512
dc6001772b3c920d9edca88bb59745de13fc29561dec81bd657dc5b2ad145723294b78f541a07d9b3a5ad8c618a8960d06312f99bdd7adf5eedc08c675a90eed
-
SSDEEP
6144:Ie346qK2ElbxBuKHBS1EEQoVGkJpDBhk6RZy:bH2EllBuKHcEEQonDdhkd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 torrent.exe -
Loads dropped DLL 6 IoCs
pid Process 2040 71565589d5b2c66b6e589030c4974a3b.exe 1448 torrent.exe 1448 torrent.exe 1448 torrent.exe 1448 torrent.exe 1448 torrent.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\intellidownload\torrent.exe 71565589d5b2c66b6e589030c4974a3b.exe File created C:\Program Files (x86)\intellidownload\header2.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header3.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\next.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\skip.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\installid torrent.exe File created C:\Program Files (x86)\intellidownload\gunzip.exe torrent.exe File created C:\Program Files (x86)\intellidownload\header.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\cc torrent.exe File created C:\Program Files (x86)\intellidownload\status torrent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000b000000014abe-1.dat nsis_installer_1 behavioral1/files/0x000b000000014abe-1.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1448 2040 71565589d5b2c66b6e589030c4974a3b.exe 28 PID 2040 wrote to memory of 1448 2040 71565589d5b2c66b6e589030c4974a3b.exe 28 PID 2040 wrote to memory of 1448 2040 71565589d5b2c66b6e589030c4974a3b.exe 28 PID 2040 wrote to memory of 1448 2040 71565589d5b2c66b6e589030c4974a3b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\71565589d5b2c66b6e589030c4974a3b.exe"C:\Users\Admin\AppData\Local\Temp\71565589d5b2c66b6e589030c4974a3b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\intellidownload\torrent.exe"C:\Program Files (x86)\intellidownload\torrent.exe" "/name=limbo_license_key_for_windows_Full_Download" "/publisher=1021" "/sub=" "/search=limbo_license_key_for_windows_Full_Download" "/type=search" "/tag=6"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e