Overview
overview
7Static
static
7d34a0c5a44...6d.exe
windows7-x64
7d34a0c5a44...6d.exe
windows10-2004-x64
7torrent.exe
windows7-x64
7torrent.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...it.dll
windows7-x64
7$PLUGINSDI...it.dll
windows10-2004-x64
7babyloneula.rtf
windows7-x64
4babyloneula.rtf
windows10-2004-x64
1gunzip.exe
windows7-x64
1gunzip.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 10:34
Behavioral task
behavioral1
Sample
d34a0c5a449dc32eec59faa00683f96d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d34a0c5a449dc32eec59faa00683f96d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
torrent.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
torrent.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
babyloneula.rtf
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
babyloneula.rtf
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
gunzip.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
gunzip.exe
Resource
win10v2004-20240226-en
General
-
Target
d34a0c5a449dc32eec59faa00683f96d.exe
-
Size
192KB
-
MD5
d34a0c5a449dc32eec59faa00683f96d
-
SHA1
3520ca6418577a4b6ed5e345acca874f2e584e54
-
SHA256
28dc03e724a2a49527b04861fba16e65c995e97efca2b5204cd9687c7f5a9b92
-
SHA512
f66877a5a15fbb3190fc47311ae2cc3cc4c5764405e9be4930ce04ae265f37ca22d121923395ac9a535bb22f9fef3666c841d869cee0c7c27994be37487acf26
-
SSDEEP
6144:Ie346TdcK2ElbxBuKHBS1EEQoVGkJpDBhk6RZY:bRt2EllBuKHcEEQonDdhkP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 torrent.exe -
Loads dropped DLL 6 IoCs
pid Process 2240 d34a0c5a449dc32eec59faa00683f96d.exe 1680 torrent.exe 1680 torrent.exe 1680 torrent.exe 1680 torrent.exe 1680 torrent.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\intellidownload\gunzip.exe torrent.exe File created C:\Program Files (x86)\intellidownload\header2.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header3.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\next.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\installid torrent.exe File created C:\Program Files (x86)\intellidownload\cc torrent.exe File created C:\Program Files (x86)\intellidownload\torrent.exe d34a0c5a449dc32eec59faa00683f96d.exe File created C:\Program Files (x86)\intellidownload\header.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\skip.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\status torrent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016d24-1.dat nsis_installer_1 behavioral1/files/0x0009000000016d24-1.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1680 2240 d34a0c5a449dc32eec59faa00683f96d.exe 30 PID 2240 wrote to memory of 1680 2240 d34a0c5a449dc32eec59faa00683f96d.exe 30 PID 2240 wrote to memory of 1680 2240 d34a0c5a449dc32eec59faa00683f96d.exe 30 PID 2240 wrote to memory of 1680 2240 d34a0c5a449dc32eec59faa00683f96d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d34a0c5a449dc32eec59faa00683f96d.exe"C:\Users\Admin\AppData\Local\Temp\d34a0c5a449dc32eec59faa00683f96d.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\intellidownload\torrent.exe"C:\Program Files (x86)\intellidownload\torrent.exe" "/name=Verified_grammarly" "/publisher=1021" "/sub=" "/search=Verified_grammarly" "/type=search" "/tag=6"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e