Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 23:25

General

  • Target

    Internet Download Manager 5.15 Build 4 + Patch + Keygen/idman515.exe

  • Size

    2.6MB

  • MD5

    f9ce2599cfa679102ff7a07149c45467

  • SHA1

    43920db51fae6cacc72c7001521ab37f111b9800

  • SHA256

    1d2a81e3b061f0dfd32ce006dfbd606d4784f5cd8def7aa1d6adbaea6e6b04fc

  • SHA512

    e79108fabe89b00775a4872b9e14a139a9bdecd861ddf524d4954df5c59d1342cea976b169d6e2a4f8307b54dbd9ddd22268889369d51db62329edaaabbe2a99

  • SSDEEP

    49152:bvVnh42maHWuvzwenVeAZRTJm1GMrpwP1l89uWfvcFokKM0XT4alFT0u7gQ1B9Li:Xv9WSzFVeAZdJm1GMrWP49uW8F3A/lFI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 5.15 Build 4 + Patch + Keygen\idman515.exe
    "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 5.15 Build 4 + Patch + Keygen\idman515.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp
      "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2428

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp

    Filesize

    136KB

    MD5

    4159103eb8369b9d6a959e805f7af13b

    SHA1

    96cc006b6a3137286dea4865e5f3c16db449e96e

    SHA256

    af83d8d0f876d214686e2b3b2cc51ee118678963df802d044aeb8da02fe4051e

    SHA512

    de2f4c6e1e8d97546f3b7531119f953ea4892b245b9a0df14d8e9423d774069ee271852416405794d0e8c58ef8fd6ac17fec5cbef1d024a00d1780291b42395d

  • memory/2212-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2212-2-0x0000000001C80000-0x0000000001CA3000-memory.dmp

    Filesize

    140KB

  • memory/2428-4-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB