Resubmissions

19/05/2024, 23:21

240519-3cgrcsge79 8

19/05/2024, 23:14

240519-28d5nsgd9s 8

Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2024, 23:21

General

  • Target

    IDM_6.4x_Crack_v19.7.exe

  • Size

    59KB

  • MD5

    27016937b5781c4f84b6b3432170f4d0

  • SHA1

    bc812a8c4d44a3503ffd6a46e4fdab925c622344

  • SHA256

    fc1a02b509b8f351ac45bd45efd4e7296b365545a48ffd6a14e8e07bc7189155

  • SHA512

    24a726276cc53c5a0d075d1bf930e24b3a1891e0754b17c28a5a35b5677fd792d9adb55e5e0a7fe18f056febb8af4a49a5a0fac33389205d1f4dcc0060422be7

  • SSDEEP

    1536:5ilGC+HMax3AZ5GiavgfreZCRIr71mazhAN5TAS:5igLV3SIareERU5mazh3S

Score
8/10

Malware Config

Signatures

  • Blocks application from running via registry modification 1 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IDM_6.4x_Crack_v19.7.exe
    "C:\Users\Admin\AppData\Local\Temp\IDM_6.4x_Crack_v19.7.exe"
    1⤵
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\SysWOW64\reg.exe
      reg.exe import C:\Users\Admin\AppData\Local\Temp\IDMRegClean.reg
      2⤵
        PID:2108
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c call "C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          3⤵
            PID:4092
          • C:\Windows\system32\reg.exe
            reg query "HKCU\Console" /v ForceV2
            3⤵
              PID:4796
            • C:\Windows\system32\find.exe
              find /i "0x0"
              3⤵
                PID:2608
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2176
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
                  4⤵
                    PID:1844
                  • C:\Windows\system32\cmd.exe
                    cmd
                    4⤵
                      PID:692
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat" "
                    3⤵
                      PID:2864
                    • C:\Windows\system32\find.exe
                      find /i "C:\Users\Admin\AppData\Local\Temp"
                      3⤵
                        PID:1216
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe "$f=[io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat') -split ':PowerShellTest:\s*';iex ($f[1])"
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2276
                      • C:\Windows\system32\find.exe
                        find /i "FullLanguage"
                        3⤵
                          PID:4752
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe "Get-WmiObject -Class Win32_ComputerSystem | Select-Object -Property CreationClassName"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1612
                        • C:\Windows\system32\find.exe
                          find /i "computersystem"
                          3⤵
                            PID:5068
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" 2>nul
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1600
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2396
                          • C:\Windows\system32\reg.exe
                            reg query HKU\\Software
                            3⤵
                              PID:4620
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid" 2>nul
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2884
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3704
                            • C:\Windows\system32\reg.exe
                              reg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software
                              3⤵
                                PID:2964
                              • C:\Windows\system32\reg.exe
                                reg delete HKCU\IAS_TEST /f
                                3⤵
                                • Modifies registry key
                                PID:1164
                              • C:\Windows\system32\reg.exe
                                reg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST /f
                                3⤵
                                  PID:3992
                                • C:\Windows\system32\reg.exe
                                  reg add HKCU\IAS_TEST
                                  3⤵
                                  • Modifies registry key
                                  PID:2916
                                • C:\Windows\system32\reg.exe
                                  reg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST
                                  3⤵
                                    PID:3684
                                  • C:\Windows\system32\reg.exe
                                    reg delete HKCU\IAS_TEST /f
                                    3⤵
                                    • Modifies registry key
                                    PID:4172
                                  • C:\Windows\system32\reg.exe
                                    reg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST /f
                                    3⤵
                                      PID:4372
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                      3⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4208
                                      • C:\Windows\system32\reg.exe
                                        reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                        4⤵
                                          PID:5032
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\DownloadManager" /v ExePath 2>nul
                                        3⤵
                                          PID:2128
                                          • C:\Windows\system32\reg.exe
                                            reg query "HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\DownloadManager" /v ExePath
                                            4⤵
                                              PID:4948
                                          • C:\Windows\system32\reg.exe
                                            reg add HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                            3⤵
                                            • Modifies registry class
                                            PID:4268
                                          • C:\Windows\system32\reg.exe
                                            reg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                            3⤵
                                              PID:3248
                                            • C:\Windows\system32\reg.exe
                                              reg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST /f
                                              3⤵
                                              • Modifies registry class
                                              PID:2424
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c powershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"
                                              3⤵
                                                PID:4192
                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1512
                                              • C:\Windows\system32\reg.exe
                                                reg export HKCU\Software\Classes\Wow6432Node\CLSID "C:\Windows\Temp\_Backup_HKCU_CLSID_20240519-232217646.reg"
                                                3⤵
                                                  PID:3024
                                                • C:\Windows\system32\reg.exe
                                                  reg query "HKCU\Software\DownloadManager" "/v" "Email"
                                                  3⤵
                                                    PID:3612
                                                  • C:\Windows\system32\reg.exe
                                                    reg query "HKCU\Software\DownloadManager" "/v" "Serial"
                                                    3⤵
                                                      PID:4520
                                                    • C:\Windows\system32\reg.exe
                                                      reg query "HKCU\Software\DownloadManager" "/v" "scansk"
                                                      3⤵
                                                        PID:544
                                                      • C:\Windows\system32\reg.exe
                                                        reg query "HKCU\Software\DownloadManager" "/v" "tvfrdt"
                                                        3⤵
                                                          PID:4436
                                                        • C:\Windows\system32\reg.exe
                                                          reg query "HKCU\Software\DownloadManager" "/v" "radxcnt"
                                                          3⤵
                                                            PID:4808
                                                          • C:\Windows\system32\reg.exe
                                                            reg query "HKCU\Software\DownloadManager" "/v" "LstCheck"
                                                            3⤵
                                                              PID:3232
                                                            • C:\Windows\system32\reg.exe
                                                              reg query "HKCU\Software\DownloadManager" "/v" "ptrk_scdt"
                                                              3⤵
                                                                PID:4328
                                                              • C:\Windows\system32\reg.exe
                                                                reg query "HKCU\Software\DownloadManager" "/v" "LastCheckQU"
                                                                3⤵
                                                                  PID:2292
                                                                • C:\Windows\system32\reg.exe
                                                                  reg query "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager"
                                                                  3⤵
                                                                    PID:2344
                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell.exe "$sid = 'S-1-5-21-4124900551-4068476067-3491212533-1000'; $HKCUsync = 1; $lockKey = $null; $deleteKey = 1; $f=[io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat') -split ':regscan\:.*';iex ($f[1])"
                                                                    3⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4504
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    3⤵
                                                                      PID:2800
                                                                    • C:\Windows\system32\reg.exe
                                                                      REG ADD "HKLM\Software\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f
                                                                      3⤵
                                                                        PID:4640
                                                                      • C:\Windows\system32\reg.exe
                                                                        REG ADD "HKLM\Software\WOW6432Node\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f
                                                                        3⤵
                                                                          PID:3676
                                                                        • C:\Windows\system32\reg.exe
                                                                          REG ADD "HKCU\Software\DownloadManager" /v "nLst" /t REG_DWORD /d "1" /f
                                                                          3⤵
                                                                            PID:1340
                                                                          • C:\Windows\system32\reg.exe
                                                                            REG ADD "HKCU\Software\DownloadManager" /v "LName" /t REG_SZ /d " " /f
                                                                            3⤵
                                                                              PID:1948
                                                                            • C:\Windows\system32\reg.exe
                                                                              REG ADD "HKCU\Software\DownloadManager" /v "FName" /t REG_SZ /d "Admin" /f
                                                                              3⤵
                                                                                PID:3032

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            2f57fde6b33e89a63cf0dfdd6e60a351

                                                                            SHA1

                                                                            445bf1b07223a04f8a159581a3d37d630273010f

                                                                            SHA256

                                                                            3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                            SHA512

                                                                            42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            e5bfec1063a497048fffb231a0621403

                                                                            SHA1

                                                                            97cf6a89f237f43b9c22e3e081f7d45924d435ba

                                                                            SHA256

                                                                            325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f

                                                                            SHA512

                                                                            e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            9c40d607cf1b4353d3ee6334566d6c05

                                                                            SHA1

                                                                            f721efab33b52e855be98a86a9fdfe0699a52456

                                                                            SHA256

                                                                            a5c6e9bea6ec56b31f91d68fa6c3f5d5ad2b4de10ab40eba706f265a91c756c8

                                                                            SHA512

                                                                            0e27affda225ba3027a0531c6b73ec4e11c46e096cf672912b3ef7e22e24d28b4f409605c6a58d4dcf1a58942853781686b8790d63b2d667bcedb15a70505764

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            3ec7192bf61c645b892a3a49564222f9

                                                                            SHA1

                                                                            a0750ba8858b1d46edae06e3d8a3928b120ccbe6

                                                                            SHA256

                                                                            3cc945fea020db691b62ba07f8dec3bc079562fed7bcb2d6237ca77f842c4e7a

                                                                            SHA512

                                                                            b662f87c57009ea9c5b35328e6b9db85d7b5e958c822c2ebc0afc2d17fda92aa88cca4dc6d8b7a05bf3ed4a775dca849a1b3f26f3da21b8c2e7d92402cc25023

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            ce5eaa6cbc87f7cea74fc78306fb646a

                                                                            SHA1

                                                                            f92913ae33a2b2829829eaed2663f364795e8998

                                                                            SHA256

                                                                            b260ac27d8c42614178b2b5705e0574b4a5af4213daaa9b174b47341e3a6984e

                                                                            SHA512

                                                                            45948248a5d5307777df92bc35dcf63366d6f94ca652117c611f85c8167c938cf6e68d7db867ea926de4525f37d0572588c3682b504075c6b9f38ae903e7932c

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            0f6a3762a04bbb03336fb66a040afb97

                                                                            SHA1

                                                                            0a0495c79f3c8f4cb349d82870ad9f98fbbaac74

                                                                            SHA256

                                                                            36e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383

                                                                            SHA512

                                                                            cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69

                                                                          • C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat

                                                                            Filesize

                                                                            19KB

                                                                            MD5

                                                                            9fe22c4ad624881f8f0977cc7614346f

                                                                            SHA1

                                                                            9716758c55c57c354fd3e7ba14a40ae03d9db7d0

                                                                            SHA256

                                                                            12b47c1949cc555c2f68f9fd4677ed5266f25c4da4630bec36e303629b133225

                                                                            SHA512

                                                                            5e54cbdabf2c84a9df1128aade9a4743e8bf26140675a43f00255e45af28862660b2d45b7138fa2b7a80c8e409bdc5a13500068aa587440cb8fa7df65d171354

                                                                          • C:\Users\Admin\AppData\Local\Temp\IDMRegClean.reg

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            45dc895cb92093f466aca0e3fe5c09b7

                                                                            SHA1

                                                                            5d815d6dde9a40a822f6144c0f7e9f31f8c6936a

                                                                            SHA256

                                                                            4c0e2396b9fca1bbeb36e9ebb27f27e63cd2662abf8b18f042d872322e1363eb

                                                                            SHA512

                                                                            e5fb3d67149c373cbb6050d3b783fe521e22a518e2bac0450d8ca2d21d9fd7686d4da631be1ae0c448da000b07f0ce205508241639712e812768c2bcab7a0ec6

                                                                          • C:\Users\Admin\AppData\Local\Temp\REG66A9.tmp

                                                                            Filesize

                                                                            32KB

                                                                            MD5

                                                                            e9d06132591c36129e4455d063612beb

                                                                            SHA1

                                                                            798619665c9915bc2f50bec9f0d9d0707a5a485e

                                                                            SHA256

                                                                            357e1fb247f831c9b4a0363445a0a7446af42dea4585f5c7357391e5732f4b2c

                                                                            SHA512

                                                                            6eabef2e10285611260d6ea1503bbb2eafb830c3dc4544f064edfa0e6821f21bbe65a77878cb18f8ebfd80ff520459e9a65f274f9c0eec7e772bec1c41d0476e

                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gvhhvrmf.sha.ps1

                                                                            Filesize

                                                                            60B

                                                                            MD5

                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                            SHA1

                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                            SHA256

                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                            SHA512

                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                          • memory/780-0-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                            Filesize

                                                                            244KB

                                                                          • memory/780-78-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                            Filesize

                                                                            244KB

                                                                          • memory/780-81-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                            Filesize

                                                                            244KB

                                                                          • memory/2276-10-0x00000251C0840000-0x00000251C0862000-memory.dmp

                                                                            Filesize

                                                                            136KB