Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
Wondershare Filmora 10.1.20.16.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wondershare Filmora 10.1.20.16.exe
Resource
win10v2004-20240802-en
General
-
Target
Wondershare Filmora 10.1.20.16.exe
-
Size
251.6MB
-
MD5
1e00ef98a9d82bfdfcffb07fece73758
-
SHA1
0cb4de979254684cfc655764de4eca0f416262f4
-
SHA256
e1335e94f215a4a565d2521b23008dc0e9ed492ff0225aebb8daaba1c89208c4
-
SHA512
33d5cb38c4a80f711c6928355156e025c3d147eac8d83c82275c04a58fae4012634254a72aeb0628b1d8167e9d92b27155424b9836f4f3caa915e47df9b9f7fb
-
SSDEEP
6291456:/+X0FlGg6WBgpZ0QHBldSfbtNzFaW5+pGGgkxSWIw:/gwlGgdBgptldeRXafqkgWIw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 Wondershare Filmora 10.1.20.16.tmp -
Loads dropped DLL 5 IoCs
pid Process 2784 Wondershare Filmora 10.1.20.16.exe 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wondershare Filmora 10.1.20.16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wondershare Filmora 10.1.20.16.tmp -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp 2960 Wondershare Filmora 10.1.20.16.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30 PID 2784 wrote to memory of 2960 2784 Wondershare Filmora 10.1.20.16.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wondershare Filmora 10.1.20.16.exe"C:\Users\Admin\AppData\Local\Temp\Wondershare Filmora 10.1.20.16.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\is-24TL8.tmp\Wondershare Filmora 10.1.20.16.tmp"C:\Users\Admin\AppData\Local\Temp\is-24TL8.tmp\Wondershare Filmora 10.1.20.16.tmp" /SL5="$110152,263301473,67072,C:\Users\Admin\AppData\Local\Temp\Wondershare Filmora 10.1.20.16.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
913KB
MD5586d1a626956e287de5b2911e57cbd27
SHA11330eca23e6a211792c6b8a03a3f888519557bb7
SHA256fac4675dda461ad7ad87797b19fd258c7faa720b98c0738f3a50e1755a3a1e4c
SHA512ed8fbf7ebf7cb73dc36ea08b6bd3090ff897a83c86e05fd52667b80548128e1a09cbcb4bd6d1d9f94a3e00eab4c9c5f8f75d425a76bc322beab9f545b4a07612
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3