Overview
overview
7Static
static
3HandBrake-...UI.exe
windows7-x64
4HandBrake-...UI.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7HandBrake.Worker.exe
windows7-x64
1HandBrake.Worker.exe
windows10-2004-x64
1HandBrake.exe
windows7-x64
1HandBrake.exe
windows10-2004-x64
7doc/COPYING
windows7-x64
1doc/COPYING
windows10-2004-x64
1hb.dll
windows7-x64
1hb.dll
windows10-2004-x64
1portable.ini.template
windows7-x64
3portable.ini.template
windows10-2004-x64
3uninst.exe.nsis
windows7-x64
3uninst.exe.nsis
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
HandBrake.Worker.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
HandBrake.Worker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
HandBrake.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
HandBrake.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
doc/COPYING
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
doc/COPYING
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
hb.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
hb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
portable.ini.template
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
portable.ini.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
uninst.exe.nsis
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uninst.exe.nsis
Resource
win10v2004-20240226-en
General
-
Target
portable.ini.template
-
Size
1KB
-
MD5
a55a14acdb96d6f87b3c5e906fd338a8
-
SHA1
e51cd75065e0f53af1e96f532569f3b7b9508771
-
SHA256
81d2a215af90f34439f598b02e330654d5d71c7667106f97a143cb319bf9b5e0
-
SHA512
f5403e9c53c930e9bb111a79d6a098037cd48b0b44e29b21021e0fd623977bd2bfafa1b0ec8be804fb23ed798132005d426f8e0b2a7b6b581cb810460c3b7b00
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.template rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.template\ = "template_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\template_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2432 AcroRd32.exe 2432 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2800 1816 cmd.exe 28 PID 1816 wrote to memory of 2800 1816 cmd.exe 28 PID 1816 wrote to memory of 2800 1816 cmd.exe 28 PID 2800 wrote to memory of 2432 2800 rundll32.exe 29 PID 2800 wrote to memory of 2432 2800 rundll32.exe 29 PID 2800 wrote to memory of 2432 2800 rundll32.exe 29 PID 2800 wrote to memory of 2432 2800 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\portable.ini.template1⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\portable.ini.template2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\portable.ini.template"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD530962e3a642546992407d783d3703b9d
SHA12164d61692ee941978eedbfa9271bd4f159b1d47
SHA25687ba5f42aadf849f365c7130880eac0e6e03cb0e99bc17e45961400f1da64800
SHA512b9e2b1e8b5d1abd8b2d2d8504b86d64a9e927a0d6975c63226fb7734050ebd050378198354c644bdd7dc5ceeb51536adb86ed2db6583694109a1b59fc83bb0d8