Overview
overview
7Static
static
3HandBrake-...UI.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows10-2004-x64
7HandBrake.Worker.exe
windows10-2004-x64
1HandBrake.exe
windows10-2004-x64
7doc/COPYING
windows10-2004-x64
1hb.dll
windows10-2004-x64
1portable.ini.template
windows10-2004-x64
3uninst.exe.nsis
windows10-2004-x64
3Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
HandBrake-1.7.3-x86_64-Win_GUI.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
HandBrake.Worker.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral7
Sample
HandBrake.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
doc/COPYING
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
hb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
portable.ini.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
uninst.exe.nsis
Resource
win10v2004-20231215-en
General
-
Target
HandBrake-1.7.3-x86_64-Win_GUI.exe
-
Size
22.6MB
-
MD5
1a1598a4f8a2d8d6b1925cb22a74d5aa
-
SHA1
ce693673a6f207be639fc07d21f90833dc386072
-
SHA256
f80829d30029ba255675929587f2b6665de2790e52b24845b92d1427c8893264
-
SHA512
63706b168aa11c6370a36fce9d73b585486f2a9e396c183eb725430f70a67d5c301701823b1e566b70a601443b748ad428de2c91e507b4a8f8d14e344571a18f
-
SSDEEP
393216:Xx4SBEeiv1+mx9BQNCX3fjSfy05s+EwWAa4ND046BsZdCu17QCnqXd:X3BE9l1XLSf9ZE5iD04RZD2d
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\HandBrake\HandBrake.Worker.exe HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\HandBrake.exe HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\hb.dll HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\portable.ini.template HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\doc\COPYING HandBrake-1.7.3-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\uninst.exe HandBrake-1.7.3-x86_64-Win_GUI.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 HandBrake.exe -
Loads dropped DLL 4 IoCs
pid Process 2280 HandBrake-1.7.3-x86_64-Win_GUI.exe 2280 HandBrake-1.7.3-x86_64-Win_GUI.exe 2280 HandBrake-1.7.3-x86_64-Win_GUI.exe 4584 HandBrake.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HandBrake.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HandBrake.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4584 HandBrake.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HandBrake-1.7.3-x86_64-Win_GUI.exe"C:\Users\Admin\AppData\Local\Temp\HandBrake-1.7.3-x86_64-Win_GUI.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
PID:2280
-
C:\Program Files\HandBrake\HandBrake.exe"C:\Program Files\HandBrake\HandBrake.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD51805fa6f0d644f6496a6bad55e99c90c
SHA1d30401b2e1c7fac59e559b8003fd303854218ee2
SHA256f2a52d4c1cf65b8e78247553dbf186f498c27775dd9fbe73b84b131ab2d53d49
SHA5122c8fa6aa05dfba4e77bdd7d59c536a3cf631f0d2a384e1dd288d8296b48cfd62fc6c7c558fa1f9974dc5c7ca252b2c7924ac6277fc152d96cb4acf9efca4304d
-
Filesize
1.3MB
MD58f8875d5712e87737c60a87461bf767b
SHA18acd337b50421b6ce15d8e26e519f7ea73cef327
SHA256edd111f32de1f935f2b35629932cf4489b2ff396e17d189e94d86edbe88edeb7
SHA512f06afadbcd170cd4353d256a6bb1940e555a2a52a6a9159cf4a03b85c5427b01d95cad2b5b0de54ba49ccf3512e160faa54a05a46974eaa36624a1973734e0cc
-
Filesize
2.2MB
MD5d6b0974cda0a5029c5e1a6cbeb025299
SHA11a1778981bc845b2198ab78c01a6449a0779d6df
SHA2569f701dcbf020854e742f75cc8b036c47241ee2f4db1d8803edb7820f3ad12c44
SHA51253b6386a897c373f249e5843bc10fcb8add579248175ef752ab63d143e66d5fe15c748682787f95b92af7b02edd75f070b4b1c2e762d89f070184ef7d18ec743
-
Filesize
2.7MB
MD51a1606c19cbd881b929b05d22bdec81e
SHA19ba20a773a139935905da17aa249ceef40388a61
SHA25695b8f10e401bb26480fddf77bd2bea92d98e2c0c05f839cae6f51a00b0e1bdd5
SHA5128d09d1399b9ee6682e75a56165cc76d84276c24d1f49423fb1d1c699a7a1d886c0ce9cf3fc07f0509f3324897484cd7b69bb9db5d229ec82c48c108dc2b61650
-
Filesize
3.0MB
MD5feced73fdecd8cfcd337e5347add2dbf
SHA12b480a588d0dfdee2d43dd58b72b57502a8fff1f
SHA2567e71da28c0a7d780c173b0f0cd534fcf69d32bf3170dbf55ddb2ae226ce20f23
SHA51233a371b4dbe34812b95498aa8d31c7fc76719484fe8ee9429e29ef459b7129d2b15586a2231a1d026c46bad46459464bc6904d8827c4c89ece39924190c71c95
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
1KB
MD5f28476740684798915855a10e2c1e0fe
SHA1528f2e6dbc31a1c6a7bb60d4a51641ff51403a34
SHA25612327bde4df657f27b99ad5f4350473db54f22f11d2ef631017ca1a7e3c2dd45
SHA5120145c49af768dc488daf5a9b6a82c2f4842554057dfe2c2ccd6d13fe81f00c747ae4d643e176b44fc212dd480baf9f69ed3bf6a08f599485883efcce0309b2bf
-
Filesize
788B
MD5de3ed84cd4eab8b50c8cae15947b7e85
SHA1a31e117f449af227205d3ed037ceeacfb86deef3
SHA2564a4d04178265fc2b9b0ee835690fb91fa60a346a73b98c32ffb5fa8491ba54c9
SHA5129b3e2dff5038f02ced9296801c2324a8be85c5a71c35e444da72f862a6ed75d0d06a5d2d8fa1da1db93faec12a20cc227011385891c4bfa920afcadba5ae2fae
-
Filesize
1KB
MD52599eb6b98cefa8613d6a3dd81224b03
SHA19cd89facc5b02de1c9d6c025d3fe723fa2624af9
SHA256d17c9f39e41bdd7082c6b6bcdf7a1b2f7f9ed42ea075499fc3da87c3f5888a4b
SHA512d4961b0a2c7db6e760953fd198a34d35bce9338312a994fb3e0c5d62deafd42f12e45028b123ebdccd745f5097e7dffba44e4b14a1a54afe74468ef2791907a9
-
Filesize
1KB
MD5ea8aceec10c5799142ada73d79a15baf
SHA1beb6dc761dab36a5698efc2129d93763a2fad305
SHA25691220615fa00e37bbff8dda7c432158db327a8aa912cb62c3c96436b6bfa28b8
SHA5127fb2c982859c218c6605ede95e8e75ce4a0985c3ad836e5a7e29ea01de9fad8afdb810fc171823770d1148c65b6e36b660594886ee29081fc5db20cdeae33d7f
-
Filesize
882B
MD506ae1da0df1907ebb63d4441c6c696e8
SHA19c1cc006798890115502da1e6ad618b85b72ce35
SHA2562f1a035999caa93158ba4210be76239c240454d04c692dae95d3231cbee1af04
SHA512bc8c9e57709b3a1723586de8ee53c091bc4964d6a16501bd6e606606454d9b144c6563206938b01ca6178724d538bcf5eb206b3def8c91ef5c8656b6847fb418
-
Filesize
1KB
MD5c20948307e9d27ba615ccae4cdc3af05
SHA193ed7f846dd7e49caaea6cd2b4987f6ec1a76c75
SHA2569a2fc164059e33f625d1423afc3fd8c0dfd4fb740b7019eff24a41b2b8c69e98
SHA512fb4d4a4757d2d96fed03c5265c4c2d28b845d60ca9b5233ad9da6074704fffafe15d14d6cdedcc58046661ce18a12f205c7baf9555623854ebae4562dea079d8