Analysis
-
max time kernel
31s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-10-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
HandBrake-1.8.2-x86_64-Win_GUI.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
HandBrake.Worker.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
HandBrake.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
hb.dll
Resource
win11-20240802-en
General
-
Target
HandBrake-1.8.2-x86_64-Win_GUI.exe
-
Size
22.7MB
-
MD5
2c7968a6e1d5425e0c2c5b2a688ee9b1
-
SHA1
ca6a865ce5dce0f8571536d0aa774c775e8ce2b5
-
SHA256
e4c3c965ed05492f73fa261d2e2560ed9f0506474956eefab176c44ee709a1ab
-
SHA512
ddb92d9aed2aa8bbd6bbcfcbf95dcfe7e3ae25c9699fe85e00a74db58884661e9cbbb435b07cf54c3d31f8630aa74fadab074fce6fe450dab4dcae84915ed90a
-
SSDEEP
393216:HxvBKL2n0yyPxwn1aYFptjxLBrZHyRiZtHzHGkX1tzgJWWql3JMQtXCdyIU6Gitd:HtULwt1ao9LbHDtHqqBOIC0IU6GiFfJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 HandBrake.exe -
Loads dropped DLL 4 IoCs
pid Process 5812 HandBrake-1.8.2-x86_64-Win_GUI.exe 5812 HandBrake-1.8.2-x86_64-Win_GUI.exe 5812 HandBrake-1.8.2-x86_64-Win_GUI.exe 2300 HandBrake.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\HandBrake\HandBrake.Worker.exe HandBrake-1.8.2-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\HandBrake.exe HandBrake-1.8.2-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\hb.dll HandBrake-1.8.2-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\portable.ini.template HandBrake-1.8.2-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\doc\COPYING HandBrake-1.8.2-x86_64-Win_GUI.exe File created C:\Program Files\HandBrake\uninst.exe HandBrake-1.8.2-x86_64-Win_GUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HandBrake-1.8.2-x86_64-Win_GUI.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HandBrake.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HandBrake.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2300 HandBrake.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 HandBrake.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HandBrake-1.8.2-x86_64-Win_GUI.exe"C:\Users\Admin\AppData\Local\Temp\HandBrake-1.8.2-x86_64-Win_GUI.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5812
-
C:\Program Files\HandBrake\HandBrake.exe"C:\Program Files\HandBrake\HandBrake.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34.8MB
MD5f3e1f308a1ce0c271b6b48e43cf395ad
SHA1471dd45bb737355cd022bef0c850336541260428
SHA25615bc21d9aa2d18d0e393b8205a190175ec0388a4fc1a9ccfee79b0e21d439a86
SHA512e04f039b52a71ea2da236d035d8bb2426cf7b1ad6ffd6aa2470f643b64a46acfd47a62073724512af77a5a959cce9a36d01127cf04b63bd3cf58caf1f8cccd20
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
1KB
MD5e236992f24866e8fc6722057b3d14979
SHA1bbbce82191fcd47dcd8f8545020e8aed1bc6fb00
SHA25671e171215eacaa8fc6f6ad99656de61d0eaee5b9d9d7994fc52d94d4c725957d
SHA512205aedb4f6486447058305a994bbfb5b342890a394d3d0e702b24c1fb1c4f1a2375f52c8fe2f8681bc421599e0338f8cbbab4b0f50cb57eddc3ab6cc49fc5c0a
-
Filesize
1KB
MD5a9b3a156c9b500dc835a6ef411d885e5
SHA122d07d9fcf5e7b00de7cc8fce5ef8b0abc75df69
SHA2568f4166111dfe01c603ce59c2b61ce0ec82a03a3f414e93907cf518f47c106179
SHA512722d0f2ce513101e9af06ace8345ba300bd0651d03f6cffc295284248c2546330dd1feed55d1c0343adacddb95874fc9d200803adf8a7bd0b08d603275be9d17
-
Filesize
1KB
MD5205a29bbe80ee8e0cb385446a4f8a4de
SHA1ffa30c7158da15b71dc31cfc35171d729f91c01a
SHA2562caf462b96e81b7303e3f0f7f09ebcc7589aff75e4eec21ea441622b66589566
SHA512b22064fdc08b362fa409d0be77971632dadcaed4070810b625903bf4eaffa6ed190d13eb05018cb56fb41c4b6bfac7de86d998e0112d6148ade17c9658be7b0e
-
Filesize
2KB
MD594d95baa93ea2c258c1d4dbbaedc47b4
SHA19f42b202f3208dcd7da74473bcb01fea42716f3e
SHA256ee7c48e1880156e3ebf47eadf6736bfe64040884cf8f4cdaf7f16fa433b570ae
SHA5129e123c3c2f4cc5a5585f019aca11ade45b656e886af8030a3debc341d0299c34de4f1572a017b013dbcca2a666e9c141bfa9dbf33a8e35740c27ea4cf0f6b5a6