Analysis
-
max time kernel
291s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe
Resource
win10v2004-20240802-en
General
-
Target
TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe
-
Size
88.2MB
-
MD5
1416efe71f62c25c47cedd41cc137586
-
SHA1
80d9fafead25fe001b19760489799de3b87d2ef3
-
SHA256
23f5ba8c7ec73c45f074138b8c09da7003d1d3c4bea3b2546755d52d583f8775
-
SHA512
f33750d988d4de97e684764098c9bdce93718037e8055c91ea0ea4c21026c6f05ff39689724ca65eb57ee0ac200f889eea64f9e322b53811e0c73c0a3776c03d
-
SSDEEP
1572864:zHFJUiSrCADbY2qkOMaIuU5AGUe8EBig/q6VBD7VDBScTFU0OtZd1u:TFKiS+KJqkRd/8gd/x3FYGFH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp -
Loads dropped DLL 2 IoCs
pid Process 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp 2508 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31 PID 1352 wrote to memory of 2508 1352 TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe"C:\Users\Admin\AppData\Local\Temp\TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\is-2SCLO.tmp\TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp"C:\Users\Admin\AppData\Local\Temp\is-2SCLO.tmp\TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.tmp" /SL5="$50150,91222162,1040896,C:\Users\Admin\AppData\Local\Temp\TubeRank Jeet Ai Pro ChatGPT Plus Full Activated.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5b378e0c68d8f0bc13f84e85fe6aef810
SHA1a85dee77ed2ced8a63766d275c3ad9a61ca5c01c
SHA25664f43409ad8878a10c9cb1746bc6d7f2b01b1aef2273b57a8b20bd9f4d5f9187
SHA5125c1e5dc2bcd166798f374e031e87c2897abebbac8a410ae823ba9358e648b0e14f28504ab95924b501ba2601c6a4749a05465f164ad83fc555f6c51d20740e02
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2