Analysis
-
max time kernel
102s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
IDMƽ V6.40 Build8 ƽ/idman640build8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IDMƽ V6.40 Build8 ƽ/idman640build8.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
IDMƽ V6.40 Build8 ƽ/װƽ.docx
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
IDMƽ V6.40 Build8 ƽ/װƽ.docx
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
IDMƽ V6.40 Build8 ƽ/ƽļ/Patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
IDMƽ V6.40 Build8 ƽ/ƽļ/Patch.exe
Resource
win10v2004-20240802-en
General
-
Target
IDMƽ V6.40 Build8 ƽ/idman640build8.exe
-
Size
10.7MB
-
MD5
80fab5f13a6a1686c9591881cdc364e0
-
SHA1
290fe176055e805cea43e4270f85634173faa7c6
-
SHA256
bc4ddda7c4fabe5091e961b166280afeeaf8de617348757fc68d65dc5752a975
-
SHA512
da3517478b6c3e0f75cd6552c5b79daed3100fa5265a67cbca739f6d2c364c25849e0c56db318e1773a513c2cd1b59320fcff343f5cff748edcef674e021633c
-
SSDEEP
196608:c9m5pSSrrli+3sjuBezMol78WLN5ppWmU4+nLHrb0fsnm0LORZCkXbZ5oD2pemxl:cWQSv3s+kMVo5Lj+nHb77kZ5boKppD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2824 IDM1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2716 idman640build8.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idman640build8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDM1.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 IDM1.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29 PID 2716 wrote to memory of 2824 2716 idman640build8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDMƽ V6.40 Build8 ƽ\idman640build8.exe"C:\Users\Admin\AppData\Local\Temp\IDMƽ V6.40 Build8 ƽ\idman640build8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD52e47a4c84ab3261533a15b078f71ddf2
SHA1e6599529b7b02255ed52e8767db3611fdef5d25d
SHA25634be308198364b9068b0a95d79465405b0639fb07d2f026b65e9df3507180c78
SHA512186b36373040bea54e3a8e6e9239fc9f946a1e0cf7547e47351211fc427ea21aafa7c4b817695cd309ae46bfccba15a3bef4b2c728531792ed4c9e7b117b00ec