Overview
overview
7Static
static
3HandBrake-...UI.exe
windows7-x64
4HandBrake-...UI.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7HandBrake.Worker.exe
windows7-x64
1HandBrake.Worker.exe
windows10-2004-x64
1HandBrake.exe
windows7-x64
1HandBrake.exe
windows10-2004-x64
7doc/COPYING
windows7-x64
1doc/COPYING
windows10-2004-x64
1hb.dll
windows7-x64
1hb.dll
windows10-2004-x64
1portable.ini.template
windows7-x64
3portable.ini.template
windows10-2004-x64
3uninst.exe.nsis
windows7-x64
3uninst.exe.nsis
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
HandBrake.Worker.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
HandBrake.Worker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
HandBrake.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
HandBrake.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
doc/COPYING
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
doc/COPYING
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
hb.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
hb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
portable.ini.template
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
portable.ini.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
uninst.exe.nsis
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uninst.exe.nsis
Resource
win10v2004-20240226-en
General
-
Target
uninst.exe.nsis
-
Size
1KB
-
MD5
2141b8e262a0f16789a1b82887dd12e9
-
SHA1
c3b13403aa98dda3b5b77cc217cf21ef7c61b0ca
-
SHA256
a7616bce17b4cb966aeb8db7db1d991321890a7aa1ec54eaa10c62ad153bb2b0
-
SHA512
17a6cf392e25dd192658410e1ba1f5a112974d493141c3bbb2bed7f7f5f883c147ccf8cf3d8bbcc3df82b7e45dde2370fd85ee513241bb7199eb6d5aa4e82ba8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.nsis rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.nsis\ = "nsis_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\nsis_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2880 2740 cmd.exe 29 PID 2740 wrote to memory of 2880 2740 cmd.exe 29 PID 2740 wrote to memory of 2880 2740 cmd.exe 29 PID 2880 wrote to memory of 2588 2880 rundll32.exe 30 PID 2880 wrote to memory of 2588 2880 rundll32.exe 30 PID 2880 wrote to memory of 2588 2880 rundll32.exe 30 PID 2880 wrote to memory of 2588 2880 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\uninst.exe.nsis1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\uninst.exe.nsis2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\uninst.exe.nsis"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55be87d78da6d24de4dae163747b1fa50
SHA15f9df9b2b92be8f96fd5d4f4d8a1aadd2c41baf1
SHA256a76067c81d7e373bf88467649a758c120a027670b86dfc0fb29eaf01d8fcac29
SHA51228800bd43a115f957ba54c76eb96a18465955573b639eb68cbe42026d8f692000c3e45154beb984d6bde17e412e9bf6f0a38e1b8df1122f1b1b9ec73ecbb97cf