Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27-04-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
YoutubePlaylistDownloader.sln
Resource
win10-20240404-en
windows10-1703-x64
8 signatures
150 seconds
General
-
Target
YoutubePlaylistDownloader.sln
-
Size
1KB
-
MD5
dd3c506f7ed81d0ee9a4794c398b7791
-
SHA1
05b999f69817ef32d30aa37d4d9ea44cbff10a3c
-
SHA256
8e720e6d9f134f3a6408f6c0d2bdf85dfd43f0cbc68af61824700f17ff4cb976
-
SHA512
d544fbbee2c4d105b2b2c046f3d436323dbf45bb97de69f0ea062949592cf9033e69ec3dabf45a42a917b156d017ee11f347fd59689fd1d15a9d71a703195509
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\sln_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\sln_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\sln_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\sln_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\sln_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\.sln OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\.sln\ = "sln_auto_file" OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3084 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 3084 OpenWith.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4420 3084 OpenWith.exe 74 PID 3084 wrote to memory of 4420 3084 OpenWith.exe 74 PID 3084 wrote to memory of 4420 3084 OpenWith.exe 74 PID 4420 wrote to memory of 168 4420 AcroRd32.exe 77 PID 4420 wrote to memory of 168 4420 AcroRd32.exe 77 PID 4420 wrote to memory of 168 4420 AcroRd32.exe 77 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 1836 168 RdrCEF.exe 78 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79 PID 168 wrote to memory of 3904 168 RdrCEF.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\YoutubePlaylistDownloader.sln1⤵
- Modifies registry class
PID:600
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\YoutubePlaylistDownloader.sln"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5CC0DF7A7081AE1DD4DE0410A35BE7C3 --mojo-platform-channel-handle=1608 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=795BD11B6A1B82D29518819CE91D53A1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=795BD11B6A1B82D29518819CE91D53A1 --renderer-client-id=2 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job /prefetch:14⤵PID:3904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B299E58D0A6BBCF0811EF327778DED82 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0F83D1B2CECF6F8AD3FE655B03A00586 --mojo-platform-channel-handle=1600 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F9705F3787BABFD1819FB311D38E0194 --mojo-platform-channel-handle=1624 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3620
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4980