Overview
overview
7Static
static
3HandBrake-...UI.exe
windows7-x64
4HandBrake-...UI.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7HandBrake.Worker.exe
windows7-x64
1HandBrake.Worker.exe
windows10-2004-x64
1HandBrake.exe
windows7-x64
1HandBrake.exe
windows10-2004-x64
7doc/COPYING
windows7-x64
1doc/COPYING
windows10-2004-x64
1hb.dll
windows7-x64
1hb.dll
windows10-2004-x64
1portable.ini.template
windows7-x64
3portable.ini.template
windows10-2004-x64
3uninst.exe.nsis
windows7-x64
3uninst.exe.nsis
windows10-2004-x64
3Analysis
-
max time kernel
158s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
HandBrake.Worker.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
HandBrake.Worker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
HandBrake.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
HandBrake.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
doc/COPYING
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
doc/COPYING
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
hb.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
hb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
portable.ini.template
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
portable.ini.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
uninst.exe.nsis
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uninst.exe.nsis
Resource
win10v2004-20240226-en
General
-
Target
HandBrake-1.7.3-x86_64-Win_GUI.exe
-
Size
22.6MB
-
MD5
1a1598a4f8a2d8d6b1925cb22a74d5aa
-
SHA1
ce693673a6f207be639fc07d21f90833dc386072
-
SHA256
f80829d30029ba255675929587f2b6665de2790e52b24845b92d1427c8893264
-
SHA512
63706b168aa11c6370a36fce9d73b585486f2a9e396c183eb725430f70a67d5c301701823b1e566b70a601443b748ad428de2c91e507b4a8f8d14e344571a18f
-
SSDEEP
393216:Xx4SBEeiv1+mx9BQNCX3fjSfy05s+EwWAa4ND046BsZdCu17QCnqXd:X3BE9l1XLSf9ZE5iD04RZD2d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation HandBrake.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\HandBrake\HandBrake.exe HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\hb.dll HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\portable.ini.template HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\doc\COPYING HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\uninst.exe HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\HandBrake.Worker.exe HandBrake-1.7.3-x86_64-Win_GUI.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 HandBrake.exe -
Loads dropped DLL 4 IoCs
pid Process 4700 HandBrake-1.7.3-x86_64-Win_GUI.exe 4700 HandBrake-1.7.3-x86_64-Win_GUI.exe 4700 HandBrake-1.7.3-x86_64-Win_GUI.exe 3604 HandBrake.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HandBrake.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HandBrake.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3604 HandBrake.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3604 HandBrake.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HandBrake-1.7.3-x86_64-Win_GUI.exe"C:\Users\Admin\AppData\Local\Temp\HandBrake-1.7.3-x86_64-Win_GUI.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
PID:4700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:1996
-
C:\Program Files\HandBrake\HandBrake.exe"C:\Program Files\HandBrake\HandBrake.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50b93bfe2bc0f11bde1d47db7c208f3a0
SHA1b5258f4eb8a5a287de513ad84d9c4417caed0c96
SHA2568326ecdc54209708731350507ae96697ab3443f6643b568f96163ac353865760
SHA512f71c3878ffbee47498cabe833caaceeb6bd47dc1b2701dd5429b3c1339a1a3a3e6d3539bbe3e7beb20514bcee5f3225ad90ca193a5760a642b1270c0fb4b7086
-
Filesize
6.0MB
MD5f50fe479d4ab0568cf70028c2137463d
SHA1edb09b575766568d55b72f70ec633570fd9bca1e
SHA25635afd91986c1425644c63738ed870519e421110e2a93672cafe414f8c193e387
SHA512a27cb5e839f9e60fae6fa9334739809a88c50600636b4d5031c4d8f877742687e56bbc309df58c0b9f209fd9a7ef18d6c1fab64992b5d994e6ce0b8c8a543d9a
-
Filesize
5.4MB
MD5ce2057ca18a44ae8b16a882025d0fa90
SHA14cde1b1ed7b8b4a1d3aed36ad03aa35e5e86a4a4
SHA2565730d66b0255bb09b1a2f64bcb4467cb4b88a057894c6203a2a4ba375b37e4db
SHA512e29d525cb3e4a1d78802d677eb8d88fd62b3b829379dfe2b28970cef868489c72d6c6e87790b14f4e77e656ec5ae171794b1f1cfd2ae46ef6d65f77252830e71
-
Filesize
7.5MB
MD5f2bfcecc553d814bb95f475e47deb57f
SHA14815a961646d899624b5e1f9aa9fb9f8291a97df
SHA2560c78ef8faa50d26c74c8db3476966cabe9f48f0cedb420bec30c18c7bfd879fe
SHA5123b0f3e9a568f7844eecc37a7114ca9c43c08b46f2b6c7f927af4a2b29bc2172399b3a312be9f2b875a8402077e7331b5d133f28d5399e4cb1906e523d609f2c5
-
Filesize
7.9MB
MD53937a6eeb32803615a310b246c270eac
SHA1d8ad641b38a65e3110764cf201d4a1924180ecb5
SHA256e5127e8bce9be55f702141435c120d6e2cc9c80a12eb467e5ad88bb53aef16b9
SHA5126eb6599eb18ee76a8e0dccb3572ead4eb88d1a0e3f5d72e372076e8d7bcdbb01dabbbcbd41a8cb3010925a44dc2dca2e34900cd39ce7b67f2fd042077bf49060
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
1KB
MD5ece12747850989133b15457a0cf5d95a
SHA179b1b6ae3f4bbb3e687208e14a1dce3d81dee7f0
SHA256083f44a3108b3a1037d50d732b830b2a8b3858c826a8a0814199e228d385755e
SHA51250ff1061cec90f243b0187583079ab731e303d42d25f2003840b4cfafe958ed8597910d57d8bd9a69193f80d6e7fb74d84ae8f2b8a42e81cdb0198078e512290
-
Filesize
1KB
MD5ea080c8c9079ae0cb0dd670c98824567
SHA1ac56bcdd1b3046b44f9e4ece4ecbb67e05d4bc47
SHA256ab62b7ab0983230cbd20b27f267cc0283b1c933aaa7f185ea2cd00fb776e9439
SHA512333bf7fb879a4f4fe0189bdc3f8ed988e11d2d2e0a44410e1f283fd41f019dfcf4c2c9d7b23c7b2c1ee457be3efffa9bd436fd99b8cd0847a85869b0d0917ad7
-
Filesize
1KB
MD50e728b9b519065032d9221c1ac575a7a
SHA10fc3174f782267f6a3c2d78578d27370f252267b
SHA2564a752cb57ff433905d7d20be0acdab08676a062aebf5e3fe06ab0a8473a0cf09
SHA512612b86095dbdc4cb9728c4d0315e3bb12fe908d47038af758c4abced163aea29721ce966a4ff8ee475a0a524d0eb143094e8ea3d74f65c7628e96e98c96217a5
-
Filesize
425B
MD5ad578625b2fff402ffdbd00e7316c47f
SHA1f57b13c127270c8c7e03910bf3639c18f252f826
SHA25699dd76f150f39d0a183f8e1828a34b58e3f86662bafe6c414ee6dac808d91e7a
SHA512bf21f6631f92f2b9ddf910a21d06f43c37226bad96be6d98b0d8e480161af9977a7cc47de53b20855e6cfe8e06555d12f1e147ea064187a81a0ca52ac58092f5
-
Filesize
2KB
MD5950253ea8d018c34f94705024310bc73
SHA1ab7702021eb34bdf87f320aca6c59c0b2ce298f6
SHA2560d78c5eb19e2d5fcecae39fb5a07eaef1b5b24f1bdbfb60be208082a6c440da8
SHA5124748bbb4ee73972e76dccbb0808eca39345179e855b2bb4f993e80557082e90cd50449503ad48671bb3bede9f52aca1e2c3c51c788eb122b22609fbe2a50255e