Analysis

  • max time kernel
    1191s
  • max time network
    1155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-09-2024 15:54

General

  • Target

    PopcornTime-latest.exe

  • Size

    55.1MB

  • MD5

    2a20ed7867a4aacd174c6c8dd7149d47

  • SHA1

    580b50d3270f7ed23261c9964c47565b697b99ac

  • SHA256

    962ba372112f89b36369ea7e465bd5b3bb6dabbb4f0d7a0cce864ef0d92c4473

  • SHA512

    207e28871f43622c4a2d96df403f87c3cd5ce8509c27341db254508b7a1e3e3eacf0e9b6e60f11d7ebc32b05baee73d1e56014be8c5902911de6a4be40d61908

  • SSDEEP

    1572864:e8Fs9keKdfusOQmr4ShHiulDJxR2Eh1VacJgxTKOul1cW:/s9/WuT44iCDToEAQeFj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PopcornTime-latest.exe
    "C:\Users\Admin\AppData\Local\Temp\PopcornTime-latest.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\is-0J87A.tmp\PopcornTime-latest.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0J87A.tmp\PopcornTime-latest.tmp" /SL5="$50226,57102192,281088,C:\Users\Admin\AppData\Local\Temp\PopcornTime-latest.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-0J87A.tmp\PopcornTime-latest.tmp

    Filesize

    1.3MB

    MD5

    505abbc7dd24887096701329036e7d05

    SHA1

    cb7dc7284509096015c8b1a716ac8cd14f9673fe

    SHA256

    34261f91a67d7e712a44eabd0ae326d90d2c1f04690afc67240f0bbb75f9e249

    SHA512

    6982cc98dc3d9cdfa764da2c60a0825d6f9110d8a89bc025cc5dcaf96c866898055fb2d58cf0b2377436644816aa94cd450241d3e913e95ecf33bd6f25756f14

  • memory/1212-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1212-1-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/1212-8-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2200-6-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2200-10-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB