Overview
overview
7Static
static
3FileAssociations.exe
windows7-x64
1FileAssociations.exe
windows10-2004-x64
1Updater.exe
windows7-x64
1Updater.exe
windows10-2004-x64
1libmpv.dll
windows7-x64
1libmpv.dll
windows10-2004-x64
1libthemes.dll
windows7-x64
1libthemes.dll
windows10-2004-x64
1sfvip player.exe
windows7-x64
6sfvip player.exe
windows10-2004-x64
6SFVIP-Play...er.exe
windows7-x64
7SFVIP-Play...er.exe
windows10-2004-x64
7SFVIP-Play...-1.dll
windows7-x64
1SFVIP-Play...-1.dll
windows10-2004-x64
1SFVIP-Play...pv.dll
windows7-x64
1SFVIP-Play...pv.dll
windows10-2004-x64
1SFVIP-Play...er.exe
windows7-x64
7SFVIP-Play...er.exe
windows10-2004-x64
7SFVIP-Play...dl.exe
windows7-x64
1SFVIP-Play...dl.exe
windows10-2004-x64
1Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
FileAssociations.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FileAssociations.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Updater.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Updater.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
libmpv.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
libmpv.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
libthemes.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
libthemes.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
sfvip player.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
sfvip player.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
SFVIP-Player-x64/Updater.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
SFVIP-Player-x64/Updater.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SFVIP-Player-x64/lib/mpv-1.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SFVIP-Player-x64/lib/mpv-1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SFVIP-Player-x64/libmpv.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SFVIP-Player-x64/libmpv.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SFVIP-Player-x64/sfvip player.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
SFVIP-Player-x64/sfvip player.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
SFVIP-Player-x64/youtube-dl.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
SFVIP-Player-x64/youtube-dl.exe
Resource
win10v2004-20231222-en
General
-
Target
SFVIP-Player-x64/Updater.exe
-
Size
205KB
-
MD5
1167f37e5bc323f8bb2dcdb565ed9d9c
-
SHA1
3952d65679abaa500c2cd71b68a79f68bc1de024
-
SHA256
96703fa2c46d73ee8c3d4e907804f2e747d3241a8c3e14ec75d08b6b66a7a5dc
-
SHA512
4f99dda54dcb481e19852b30d5c9c68b5ae499bbbb1be59b06184b48a8ef901d5965da97424779a3af2c94cf59fe77b08f7c5948a5f7128b02b851af1efc8fdf
-
SSDEEP
3072:EDPzfc126+ToKe7WSA7hqToKe7WSAphS:xkoKe2WoKeQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Updater.exe -
Executes dropped EXE 3 IoCs
pid Process 2120 Updater.exe 3536 Updater.exe 3084 sfvip player.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 raw.githubusercontent.com 20 raw.githubusercontent.com 26 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2120 Updater.exe Token: SeDebugPrivilege 3084 sfvip player.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5024 wrote to memory of 2120 5024 Updater.exe 83 PID 5024 wrote to memory of 2120 5024 Updater.exe 83 PID 2120 wrote to memory of 3536 2120 Updater.exe 84 PID 2120 wrote to memory of 3536 2120 Updater.exe 84 PID 3536 wrote to memory of 3084 3536 Updater.exe 87 PID 3536 wrote to memory of 3084 3536 Updater.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\Updater.exe"C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\Updater.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe" -Update "C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\Updater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\Updater.exe"C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\Updater.exe" -Clean3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\sfvip player.exe"C:\Users\Admin\AppData\Local\Temp\SFVIP-Player-x64\sfvip player.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ae98bd2d43b819841abe713a8b803ecb
SHA11f7711ff263159cac9aa6b6902dbec722f3df67f
SHA2565b5e6ea00d747cc516bf4d8fe823911dcd8c4fe77ffdfe3f51a1b4fec6f79b1e
SHA5129bbf167e0e46fbe57c024fb29247e8a96d3a215303907577dbddc7e0aa972c0f00ac73d1cc811619041dc7d7c18c67fee7541686b8623e62fb005045d432d515
-
Filesize
360KB
MD5da0ce2e508257db01a1f9fa3117f3d20
SHA1b78eae612eab5d65cc9f8ebe024ae05b99034344
SHA25688173972e3a73596aa6197b733cc59509ea2f3077b6eb3f922040da3fc6060d8
SHA5128c0bc1d2ea840d3b4c82f06375a28b012182020fe01ab9b8bcb824a6e6629134e3ff26c578bbe854e98bb5d96a73d96a60ff7ecbf00137e99bdead8dbd345d2f
-
Filesize
23KB
MD532f998dd26b27e45378946e42659d581
SHA1ab92eb18f5ebca8e774c99f49a6423e8932915ce
SHA256e0e9128b1071144213c2f80d123939d537404eb4b0ed5d0b57cc4239fa97de62
SHA51269e79206f80bb3c14a16a43047e38162549c5958c224228060645189c31e956880081c554a2131d197cf81574cbe625ea868598f876ea668835d76c6d7062a13
-
Filesize
428KB
MD5917d4de2a361211366d461c12a4f49f4
SHA1fe1ef6a2a0e08ddb0cc5206681fd9f544cefaf66
SHA2560ea908c745e0cfb01c9c4539ef31c20f0c9cd52aecaf5cab32851adc3d5495e6
SHA512270c611997a5f93daa8634b86ff20db2bd8e55a896fd6b88480f562bb52fafbf859afdf03a46961530d7c3ee221af6e70b249ebe49139695fe30a2602915d8de
-
Filesize
478KB
MD524178b595b2542beba6513d3841f24e0
SHA1593861c9004b71b71a542a1d9a111315e82248fa
SHA25609eb25d8f02ea4949ca2faa2c882973d2c55da555d79c43f711fcf86842361bb
SHA51211479842a47fbcc3561f85ad8acbcbe3ce69b56d1588dbb8e747438b493d4892e622a5a15871b7981933f71f51184e58fa56f96ded7e0c2b7da1fa89b80ed6a6
-
Filesize
853KB
MD59d5eb08c1f77ee9cc639daf12202e9ce
SHA1955594c1d083433db1354b935d76a629e38b437a
SHA2560850c2a156096dc2fcf9cfb04c49495d83c30eaa5e9f77e98408dfce723b517b
SHA51234b59be47e287a74e50845364e65ca37f316be185c170b1b0615228b749ae9cf31e52c7176acb6d38b13cbf027c24f28ae62d474faf21b684aeea4e4b25c0269
-
Filesize
178B
MD5fa4323d079346ecb5bd95a9a46c61cd0
SHA10260f7621ce53ca3918d918c1730affa46885bf8
SHA2561db230d0cecfb848155ced039164e79b146efb10e0804154ce643eca6438a0b5
SHA512aa2343b23e42e77153a9289487adc8996e64b55a08ae94cd4fb99fc5c873d70270e6792e9705ff6962fee88eea31d850c268c10aef3311b0fa4c5b174aa6e0a5
-
Filesize
205KB
MD51167f37e5bc323f8bb2dcdb565ed9d9c
SHA13952d65679abaa500c2cd71b68a79f68bc1de024
SHA25696703fa2c46d73ee8c3d4e907804f2e747d3241a8c3e14ec75d08b6b66a7a5dc
SHA5124f99dda54dcb481e19852b30d5c9c68b5ae499bbbb1be59b06184b48a8ef901d5965da97424779a3af2c94cf59fe77b08f7c5948a5f7128b02b851af1efc8fdf