Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 17:23

General

  • Target

    utorrent.exe

  • Size

    1.7MB

  • MD5

    afcbee0633928a7f3fd238028d7bbac8

  • SHA1

    db1279331d529bcde5b39bb178a6b9f8c84fa6b0

  • SHA256

    66df7da160bc791e894f752c42b2055288faf717d053e6a912ccaed971225e4f

  • SHA512

    8cd91c76003b77aa920f59e62768ff8696567a0c78c7783881b170136f1de2e22f7075515f3b44f533782f477d62ed55d82da2fb78e75fd847aa654b26ac3881

  • SSDEEP

    24576:Y7FUDowAyrTVE3U5F66JCK/eI4SOfxEaboyeDIKR28Nbc8nyuV+ot6VWZv+l+JGB:YBuZrEUFJ1/eI43uaQnFZcc0Pgk+JG

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\utorrent.exe
    "C:\Users\Admin\AppData\Local\Temp\utorrent.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\is-8DLSJ.tmp\utorrent.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8DLSJ.tmp\utorrent.tmp" /SL5="$40152,861770,820736,C:\Users\Admin\AppData\Local\Temp\utorrent.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1efb66aac679748865de18dd57c020f8

    SHA1

    65aad874c15074183ba203643c7107c2b4881b80

    SHA256

    4e3376cd2874e508effa7fdf1b6dcbbe8947add4b763ecb9ebfda24a1723a2dd

    SHA512

    3c3b2d3351610941ad88a6d41de37cb516ce768754ac49ba301347a2affad5d91d96c76465b8f5834b43148eda98e1b98b9d5550668aa2c31585691cedea230d

  • C:\Users\Admin\AppData\Local\Temp\Tar17DB.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\is-8DLSJ.tmp\utorrent.tmp

    Filesize

    3.0MB

    MD5

    68a5962adc5171a34dab74216f15589c

    SHA1

    e35a06078a8995e162d09ba90af614cfcc7a075f

    SHA256

    da33e2011c8baa57e11e96a4cd1d928c20b8ed4f4f01ae4630eb5acd984590d5

    SHA512

    2966550b39911ff9d71fd757e7af9380f22e1d34042ab2b8f75656277794cee7cfb21089e4562a0cff3d596525ec28b095515010234410bbf3107f28e4158878

  • memory/2324-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2324-0-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB

  • memory/2324-134-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB

  • memory/2908-9-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2908-135-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB