Overview
overview
7Static
static
33dRipperPro.exe
windows7-x64
13dRipperPro.exe
windows10-2004-x64
1Bulk Downloader.exe
windows7-x64
1Bulk Downloader.exe
windows10-2004-x64
1Command Li...es.cmd
windows7-x64
1Command Li...es.cmd
windows10-2004-x64
1Data/3dripper.exe
windows7-x64
1Data/3dripper.exe
windows10-2004-x64
1Data/3dripper.exe
windows7-x64
1Data/3dripper.exe
windows10-2004-x64
1Data/DecryptTex.exe
windows7-x64
7Data/DecryptTex.exe
windows10-2004-x64
7Data/Noesi...is.exe
windows7-x64
3Data/Noesi...is.exe
windows10-2004-x64
3Data/Noesi...gl.dll
windows7-x64
3Data/Noesi...gl.dll
windows10-2004-x64
3Data/Noesi...is.dll
windows7-x64
3Data/Noesi...is.dll
windows10-2004-x64
3Data/Noesi...on.dll
windows7-x64
3Data/Noesi...on.dll
windows10-2004-x64
3Data/Noesi...bx.dll
windows7-x64
3Data/Noesi...bx.dll
windows10-2004-x64
3Data/Noesi...iew.py
windows7-x64
3Data/Noesi...iew.py
windows10-2004-x64
3Data/Noesi...sis.py
windows7-x64
3Data/Noesi...sis.py
windows10-2004-x64
3Data/cares.dll
windows7-x64
1Data/cares.dll
windows10-2004-x64
1Data/colla...mt.dll
windows7-x64
1Data/colla...mt.dll
windows10-2004-x64
1Data/gdal201.dll
windows7-x64
1Data/gdal201.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 15:18
Behavioral task
behavioral1
Sample
3dRipperPro.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3dRipperPro.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Bulk Downloader.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Bulk Downloader.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Command Line Examples.cmd
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Command Line Examples.cmd
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
Data/3dripper.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Data/3dripper.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Data/3dripper.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Data/3dripper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Data/DecryptTex.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Data/DecryptTex.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Data/Noesis/Noesis.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Data/Noesis/Noesis.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Data/Noesis/noegl_opengl.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
Data/Noesis/noegl_opengl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Data/Noesis/noesis.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Data/Noesis/noesis.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
Data/Noesis/plugins/NoesisPython.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Data/Noesis/plugins/NoesisPython.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Data/Noesis/plugins/autodesk_fbx.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Data/Noesis/plugins/autodesk_fbx.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Data/Noesis/plugins/python/fmt_artstation_mview.py
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
Data/Noesis/plugins/python/fmt_artstation_mview.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Data/Noesis/plugins/python/inc_noesis.py
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Data/Noesis/plugins/python/inc_noesis.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Data/cares.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Data/cares.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Data/collada-dom2.4-dp-vc141-mt.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Data/collada-dom2.4-dp-vc141-mt.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
Data/gdal201.dll
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
Data/gdal201.dll
Resource
win10v2004-20240508-en
General
-
Target
Command Line Examples.cmd
-
Size
379B
-
MD5
ea34aeffb40b76122edec5f028441bc4
-
SHA1
72e9642ed07f2941e590af9634c740a7073b559d
-
SHA256
b6f7616f406f074dc9e75f28df169444f370ba6605bbcff97a165dd799f29126
-
SHA512
009f1c32511a4410ae33a1782a917137bd893d99daa3c6f32b3b7dbf1c30d29eea56b2dd3bb1709292670d317459e514501bd41b8c3334498d16fe21334add91
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
pid Process 1660 3dRipperPro.exe 2116 3dRipperPro.exe 2100 3dRipperPro.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 3dRipperPro.exe 2116 3dRipperPro.exe 2100 3dRipperPro.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1660 2180 cmd.exe 29 PID 2180 wrote to memory of 1660 2180 cmd.exe 29 PID 2180 wrote to memory of 1660 2180 cmd.exe 29 PID 2180 wrote to memory of 1660 2180 cmd.exe 29 PID 2180 wrote to memory of 2116 2180 cmd.exe 30 PID 2180 wrote to memory of 2116 2180 cmd.exe 30 PID 2180 wrote to memory of 2116 2180 cmd.exe 30 PID 2180 wrote to memory of 2116 2180 cmd.exe 30 PID 2180 wrote to memory of 2100 2180 cmd.exe 31 PID 2180 wrote to memory of 2100 2180 cmd.exe 31 PID 2180 wrote to memory of 2100 2180 cmd.exe 31 PID 2180 wrote to memory of 2100 2180 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Command Line Examples.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\3dRipperPro.exe3dRipperPro.exe 347cae9f87104374bc3ac554d9d3fd6e2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\3dRipperPro.exe3dRipperPro.exe 450fb6a057fd4ce4a416c714a5676fdf textures2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\3dRipperPro.exe3dRipperPro.exe 450fb6a057fd4ce4a416c714a5676fdf batch2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2100
-