Analysis
-
max time kernel
181s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
uTorrent.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uTorrent.exe
Resource
win10v2004-20240226-en
General
-
Target
uTorrent.exe
-
Size
2.7MB
-
MD5
31b6c42ac6e43b3774315e7b405ce23b
-
SHA1
ad99c0ecaaff5b9f6be8a12689b03cee97864292
-
SHA256
866a8fb02c387b7160d43fb72cc5cfbc5acbb0df825be2f359727bafedc56d3a
-
SHA512
cc0decb68a781f5650ccbb8a95d2dd7861129b33dc8a6669f4a77c2a9d7b1464bfb9515c56b98c7179a50b43b16cc91713c79c74f84d1779d97cc2824a983dd4
-
SSDEEP
49152:oG5Ufg9vNl50b2t0KjlhuruchD0iLq3kY7AsollvFaBcY3BRGBZ3P2+AEsEN09:oG5Qg9vn5eR3D0iO3r7AsolXaBr3vAZc
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2380 installer.exe 2092 GenericSetup.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe 2092 GenericSetup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2092 GenericSetup.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2380 4924 uTorrent.exe 93 PID 4924 wrote to memory of 2380 4924 uTorrent.exe 93 PID 4924 wrote to memory of 2380 4924 uTorrent.exe 93 PID 2380 wrote to memory of 2092 2380 installer.exe 94 PID 2380 wrote to memory of 2092 2380 installer.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\uTorrent.exe"C:\Users\Admin\AppData\Local\Temp\uTorrent.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\7zSC3372E28\installer.exe.\installer.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7zSC3372E28\GenericSetup.exeC:\Users\Admin\AppData\Local\Temp\7zSC3372E28\GenericSetup.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5f60bff7133d9c6c895e3cf45937caea3
SHA13c91c9b8980e641d5c874eda0efa3d1d5f3003e3
SHA25626d8eae8470e4e4b02a8a7a4d1e13ba27a9b8fb739a113fe763eda61fc44a102
SHA512daa0e7ed662b931c836ca861b4311f547055cf0495936c410ce93d8136e4defcfcb078932ca1c0da2a3b0b758f50ca3cf12d814d2ce89a4b19fe54c452275557
-
Filesize
291KB
MD507aa211ce6e5c1169ad9c451a99934a9
SHA1c79646ec41544b779dea9b2cc741774551bd1a58
SHA2566ef65465a2afbefd8e45fcea27734f63e142f2db32909b1aaa6c918925d154e6
SHA5124664babf77fabd08a30c5f985b63880486ea8c096d8602a302a4580ab9928bcce9ca947a25a7e74c8cddcb486786257de821547dabe31e971b0a66755c4cd7f0
-
Filesize
68KB
MD5db7f20eeb9e86758922997138deb9e8e
SHA186054cdbddd68d0958d821198f399f11ba0b9502
SHA2567d173a0091162c2b28cb288c1b71fc732c70f18ab8380324f023f81bf9f2421b
SHA5126a4516e0166418620897e744267931205e11552637c2e76291bda82608ae099cdacd658d6c48c8180f4e552be11bd50ef48a140614ed1a4bb825fd75f191f441
-
Filesize
1KB
MD580a504d4544124fda7036d6b70317f94
SHA142384a541d861c59729c2ea391fa4ba5e2b6799f
SHA256126a7ab225ed88d506bf86ac2af9dff6cb223e1162685c81b1445eb2cd2a324a
SHA512005544bb6f3843823c6a895590ec918d809e422e8063768e4cad9eaa28c50b3ea5837d3b71f9b5b762bf8161029cfdd677cf28c1a4c80cfa72f4d19b2aca2780
-
Filesize
56KB
MD5b945ea4ebab4169a82a199e8cebaa21e
SHA1d71c00cf5f286a45fd2c7099904fbfd27755ef7b
SHA256bf80c8b5d0d6ca7f277719ce797c6d09db990a31e6f3c9a7956763f193a7b8c2
SHA512fdd3893e99709cbfe898eb1fb6858a6638f8c6817883efaf7f8aaac34146f310e54838fc317f6a3aa69b10d48613fbadff298bd3f120485c5a540ef56a25c995
-
Filesize
1.4MB
MD5531687aed093d23b9213b16b5216ef46
SHA14e81eab76eda4daedf709d3191cd9c040758ceaa
SHA256c12eb9e06d40499dfcf6e1343895c04295f461823bf9c20c4147f994a1e67108
SHA512fdf8cf42bfac7739679a40ab3790093489c20c004531bc508ea50715d3b938907ccc34c88dfefce4cb51db6f7e88bfe70afe1ae8a03b7b0798835515e27519eb
-
Filesize
17KB
MD50ef592926ca8f79988d8c7df695b0d7e
SHA1185562111ba45520eecd6e8559fc1d2fb402bec2
SHA256e3a1dca99b96d7d6bd1391bd20fb450a8ba750adda029865fdf4739c04c5d18a
SHA5123520e1a426153a07da03f8c1176b932ce0a9afa3a733ab78b27ffef7224545b8cf1c448c974cbe4afbf44d2fa953f3b60b7370b9c140a1d99cee425cda531db3