Analysis

  • max time kernel
    304s
  • max time network
    323s
  • platform
    windows7_x64
  • resource
    win7-20231215-es
  • resource tags

    arch:x64arch:x86image:win7-20231215-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    12-02-2024 17:39

General

  • Target

    WFV130605095MIPX64/Wondershare.Filmora.v13.0.60.5095.Multilingual.Incl.Patch-x64/filmora_64bit_13.0.60_full846.exe

  • Size

    507.0MB

  • MD5

    63599a8b1b370b25cd14fbe9c25800fa

  • SHA1

    24bbaaf356a3c10b4145a6595bb5065063e89a79

  • SHA256

    0c0a1fcf1cd8bb26186f4c859094f616b1b35ffdfa8db4c3fcdffe29a02d68ba

  • SHA512

    f67785d8f2ddbe9fee97b1b374d1051fb6e23df12a3490d47c80234cbca1654dc9fa99929a5f9c67408cc58050bcf0bc7b100a225ab792f12d64f08172586e4a

  • SSDEEP

    12582912:53Ms0X3yYGTI/NNKlA3qBuS4QaT5d2CVd+vh4Z8ph3DS8dYXXmig60c:5crytM/Nsl8uuSs5sCVwvhrzzfYHmiga

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WFV130605095MIPX64\Wondershare.Filmora.v13.0.60.5095.Multilingual.Incl.Patch-x64\filmora_64bit_13.0.60_full846.exe
    "C:\Users\Admin\AppData\Local\Temp\WFV130605095MIPX64\Wondershare.Filmora.v13.0.60.5095.Multilingual.Incl.Patch-x64\filmora_64bit_13.0.60_full846.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • \??\c:\users\admin\appdata\local\temp\wfv130605095mipx64\wondershare.filmora.v13.0.60.5095.multilingual.incl.patch-x64\filmora_64bit_13.0.60_full846.exe 
      c:\users\admin\appdata\local\temp\wfv130605095mipx64\wondershare.filmora.v13.0.60.5095.multilingual.incl.patch-x64\filmora_64bit_13.0.60_full846.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\is-Q09ED.tmp\filmora_64bit_13.0.60_full846.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-Q09ED.tmp\filmora_64bit_13.0.60_full846.tmp" /SL5="$40184,529318872,421888,c:\users\admin\appdata\local\temp\wfv130605095mipx64\wondershare.filmora.v13.0.60.5095.multilingual.incl.patch-x64\filmora_64bit_13.0.60_full846.exe "
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2628
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2768
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2164
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:480
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2996
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:808
            • C:\Windows\SysWOW64\at.exe
              at 17:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:1540
              • C:\Windows\SysWOW64\at.exe
                at 17:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:2416
                • C:\Windows\SysWOW64\at.exe
                  at 17:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1044
                  • C:\Windows\SysWOW64\at.exe
                    at 17:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                      PID:1616
                    • C:\Windows\SysWOW64\at.exe
                      at 17:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                      6⤵
                        PID:2488

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\WFV130605095MIPX64\Wondershare.Filmora.v13.0.60.5095.Multilingual.Incl.Patch-x64\filmora_64bit_13.0.60_full846.exe 

              Filesize

              14.4MB

              MD5

              1a15478d54fbb44d472125b7479dcf7f

              SHA1

              aa62d6400b71ee3389c378d604a06fbf1e684846

              SHA256

              6a9a16e446840c5528be77dbcf7286444daf3038763a2a7bc95ef89f1c1578ad

              SHA512

              37bffa4a56e7b61b8b30f32d98cfe4a940e264f55304497b6a311b3952aeffa855da03721a4267b2e4e049e6642a0e8376fb1273ffb455db7d33409e524eaa63

            • C:\Users\Admin\AppData\Local\Temp\is-Q09ED.tmp\filmora_64bit_13.0.60_full846.tmp

              Filesize

              256KB

              MD5

              7135c2e2bb5800ba6a83a77e2357ee05

              SHA1

              10b4e78c3f9b55436ffc601abdaf7a2a7f9e63f6

              SHA256

              414993c73001985aea7ca64c15445052550b34227fc952efbf1e368bbdb76bca

              SHA512

              f03f93450dfdb199bbfe649c514ca0bbcf349acfb81622707088e580519e1ac431744c2860e944d7b48b06f33da85603f359647d36f22faebb7255c0efda9066

            • C:\Users\Admin\AppData\Local\icsys.icn.exe

              Filesize

              206KB

              MD5

              a5ad5523488815ed3701cd4a7dd6facf

              SHA1

              1d561163ba09c6a613fc76afc52996ba22212e11

              SHA256

              57694ec7cd899648c9b4677b8433604d5ea7f2956982e7bae176f8789c6e405e

              SHA512

              c386791281034b16422ea6a0f0313e2b30bc3ac94f50daa06715ae337845cf72af150f06d24aae434f86eacb1b80e2eb181ce184bad967c66db64628fef68733

            • C:\Users\Admin\AppData\Roaming\mrsys.exe

              Filesize

              207KB

              MD5

              e5147d6e869ea5bd4eccbcf35d096aee

              SHA1

              069a8ff22707f6841fa0b7d8a4a5de9634e0486a

              SHA256

              99aea70355211e2b30aee216da62a69d4ce76b02ab31515c9394c7bd3c82976c

              SHA512

              556619d113a1293b0158691ec207c520e771a35dab1f3be704f7031005b4e5b06fdb5eb77f64d2e03674b4ccec3cb7534b4b8e1987ddf5c4bd3ff85af4e4b908

            • C:\Windows\system\explorer.exe

              Filesize

              128KB

              MD5

              b7d2f3cef390dd7ec4a94e97b4215a71

              SHA1

              d9bad4433d70436c68186c8a9f906b00eb5c5275

              SHA256

              084d387f6e2ea11df150dbbab7e02920e0051f6fcc0107ed607409343fbf4937

              SHA512

              b6daf992823b15cb7b7f1fb1a84e65224ff3051cbbdedf46dc9778831f48f768f8e911140155c567b4385078ccd380f8f1e34955f420153fefb41b40c822c574

            • \??\c:\users\admin\appdata\local\temp\wfv130605095mipx64\wondershare.filmora.v13.0.60.5095.multilingual.incl.patch-x64\filmora_64bit_13.0.60_full846.exe 

              Filesize

              576KB

              MD5

              6bba12365c1db431db9b94f0cb8c6593

              SHA1

              bce7ceaa72093c5081f5c5ca58ea70174cea1710

              SHA256

              878c117fd5d3e205c322398b0b2420dfe8b2e87b30d0d0246fd06aafe3239cb1

              SHA512

              e68b04753c2ce50a95245b574063a465aff6b23148575c6fe45db9108415b78dd550f102cf84f7189a941b70ccf6e982e199e28b51a5a6fc23aabac19cbc5ba5

            • \Users\Admin\AppData\Local\Temp\WFV130605095MIPX64\Wondershare.Filmora.v13.0.60.5095.Multilingual.Incl.Patch-x64\filmora_64bit_13.0.60_full846.exe 

              Filesize

              12.0MB

              MD5

              148439095bd943bc806dfcec143b2dd6

              SHA1

              ebbb9522331aef38c7580b5eb3ab6f1da51fe771

              SHA256

              cdf16e2f46195a3497f4b48cc057ef8f1b7ab2144ec8e9336756142875c66e9d

              SHA512

              cb9154a7f7cb4715bc16d786462548f254cfe212f7e63ee02aacec839dd86e37cdc33bfb6e7edeb3b50fe425a24dd72034a3d12c9bec8870e5b120395c901096

            • \Users\Admin\AppData\Local\Temp\is-Q09ED.tmp\filmora_64bit_13.0.60_full846.tmp

              Filesize

              320KB

              MD5

              334d094f98c00fc875708666ea700bf1

              SHA1

              589738ec6c022b1854eb3230303f38fabae167ca

              SHA256

              aa86b5798406deb0b99191b042bad3b5fc4af5d73e83e847948cc5a57b0a605c

              SHA512

              c8b4e32816b55977d9f0a994a69f609d4eb689616594c07d54044a5723130dae4360a6d1a2ce4944391473aa774f0ea2bde5ab7d77525b3d44373af59d1185b6

            • \Windows\system\explorer.exe

              Filesize

              206KB

              MD5

              ee347a77740f4d8e1948aef0afe65ec8

              SHA1

              1b7b83109dfb891b67bd018cd9f85cefe9e2a423

              SHA256

              edb92571bdbd2a554368816c1f37cfe731725964585e69c48e16b99be341fa35

              SHA512

              02ebc8b199cb830f9877a763fddc9257ce88358f2e74c350152a369cb8e2f305daed74f90be32db2fe472bf6f3374b4a873fd9fcba01c0dbfa4e0a1b217f3d63

            • \Windows\system\spoolsv.exe

              Filesize

              206KB

              MD5

              53424a5558813f99b8313ef815f8ebeb

              SHA1

              c5008488ccc7e176a70621ee234d917a254b1d92

              SHA256

              888e1e6c5db0b1750d3ec74f2b1c1f6da7e1806498bf6e7e2841e2cc33d9317f

              SHA512

              e8c5ea50e1e7c921d5d2b904753ef9d4f28d348d972d3a21c2b417dc6f5c53fd94654da2d96dca3e2b01a77fd7f3879e2980a5fa3c9e9ebd0378077210bba765

            • \Windows\system\svchost.exe

              Filesize

              206KB

              MD5

              5d4666ddb4a44093f5242db96005fe82

              SHA1

              ce402fcb819020546bffb7333b08b0feacf341e0

              SHA256

              a47fa738242d903b3c50d868befa34dc8f22df59d35fbf8de2d39eda894a3481

              SHA512

              290f9d4b9591f92ea68812a5e6839d849917279fe0e3d1a71736d2cd44938b406adc0a39be5e3aa91d66262ad4a689032260929ae924c4b91c4e5e2a8e83224c

            • memory/480-81-0x0000000001DC0000-0x0000000001E00000-memory.dmp

              Filesize

              256KB

            • memory/480-71-0x0000000001DC0000-0x0000000001E00000-memory.dmp

              Filesize

              256KB

            • memory/480-97-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/808-94-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/808-96-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1728-52-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1728-28-0x0000000000440000-0x0000000000480000-memory.dmp

              Filesize

              256KB

            • memory/1728-0-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1728-26-0x0000000000440000-0x0000000000480000-memory.dmp

              Filesize

              256KB

            • memory/2164-131-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2164-59-0x00000000025A0000-0x00000000025E0000-memory.dmp

              Filesize

              256KB

            • memory/2628-66-0x0000000000400000-0x000000000056A000-memory.dmp

              Filesize

              1.4MB

            • memory/2628-30-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2768-76-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2768-42-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/2768-47-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/2940-45-0x0000000000400000-0x0000000000471000-memory.dmp

              Filesize

              452KB

            • memory/2940-15-0x0000000000400000-0x0000000000471000-memory.dmp

              Filesize

              452KB

            • memory/2940-13-0x0000000000400000-0x0000000000471000-memory.dmp

              Filesize

              452KB

            • memory/2940-10-0x0000000000400000-0x0000000000471000-memory.dmp

              Filesize

              452KB

            • memory/2996-83-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-93-0x0000000000580000-0x00000000005C0000-memory.dmp

              Filesize

              256KB

            • memory/2996-136-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2996-139-0x0000000000570000-0x00000000005B0000-memory.dmp

              Filesize

              256KB

            • memory/2996-140-0x0000000000580000-0x00000000005C0000-memory.dmp

              Filesize

              256KB