Analysis

  • max time kernel
    36s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-10-2024 19:34

General

  • Target

    HandBrake-1.8.2-x86_64-Win_GUI.exe

  • Size

    22.7MB

  • MD5

    2c7968a6e1d5425e0c2c5b2a688ee9b1

  • SHA1

    ca6a865ce5dce0f8571536d0aa774c775e8ce2b5

  • SHA256

    e4c3c965ed05492f73fa261d2e2560ed9f0506474956eefab176c44ee709a1ab

  • SHA512

    ddb92d9aed2aa8bbd6bbcfcbf95dcfe7e3ae25c9699fe85e00a74db58884661e9cbbb435b07cf54c3d31f8630aa74fadab074fce6fe450dab4dcae84915ed90a

  • SSDEEP

    393216:HxvBKL2n0yyPxwn1aYFptjxLBrZHyRiZtHzHGkX1tzgJWWql3JMQtXCdyIU6Gitd:HtULwt1ao9LbHDtHqqBOIC0IU6GiFfJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HandBrake-1.8.2-x86_64-Win_GUI.exe
    "C:\Users\Admin\AppData\Local\Temp\HandBrake-1.8.2-x86_64-Win_GUI.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3744
  • C:\Program Files\HandBrake\HandBrake.exe
    "C:\Program Files\HandBrake\HandBrake.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\HandBrake\HandBrake.exe

    Filesize

    34.8MB

    MD5

    f3e1f308a1ce0c271b6b48e43cf395ad

    SHA1

    471dd45bb737355cd022bef0c850336541260428

    SHA256

    15bc21d9aa2d18d0e393b8205a190175ec0388a4fc1a9ccfee79b0e21d439a86

    SHA512

    e04f039b52a71ea2da236d035d8bb2426cf7b1ad6ffd6aa2470f643b64a46acfd47a62073724512af77a5a959cce9a36d01127cf04b63bd3cf58caf1f8cccd20

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\HandBrake\HandBrake.lnk

    Filesize

    898B

    MD5

    1cb8885b4986c87dbbb3d2efd346e3e3

    SHA1

    bd3c5d8230615ffdba42d2f1a68898a648b033b7

    SHA256

    6b8233e069c967b68f1d7011406d826133498acf6fdbda18467aaca8ec2f4fdf

    SHA512

    5f1631248098145a1e9afc61e5ecc8273f48624d1fe3161b5ce2cbc3efe1ac8a650cdf8142a208c2d28d776a329b88ccfb142b29fcf4b7db56437ac205d8c07c

  • C:\Users\Admin\AppData\Local\Temp\nst8F60.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    d095b082b7c5ba4665d40d9c5042af6d

    SHA1

    2220277304af105ca6c56219f56f04e894b28d27

    SHA256

    b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

    SHA512

    61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

  • C:\Users\Admin\AppData\Local\Temp\nst8F60.tmp\System.dll

    Filesize

    12KB

    MD5

    4add245d4ba34b04f213409bfe504c07

    SHA1

    ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    SHA256

    9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    SHA512

    1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

  • C:\Users\Admin\AppData\Local\Temp\nst8F60.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    8ea5286b1599966ed453b59eda65da5c

    SHA1

    61898df6badd9ce255643aec5127ad220ff59b7e

    SHA256

    3c2612375b07a8fa0b262c642e4715cd78562bebec1ef377b38a71d2cba0b73a

    SHA512

    e5c6f909199d5c6f03b04c19073cd3a954033e7fed9854174fdd8508e78f72f7086fe009aa10774ff8177185ccc62c15705bae89921171a6280404534879045c

  • C:\Users\Admin\AppData\Local\Temp\nst8F60.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    724382f84b7c709ad51ba8f6ad3424f1

    SHA1

    7e65dbd27cfadf21175488eca130bf6b2f3322af

    SHA256

    56470074576df292f271f96caba2fea645f3fe2332369859f36dbf9ac3efc658

    SHA512

    6b44787aa6f3be95b7015ddf47d27e823037f8f3059c0bd2d48e2c29a091d55683c38ce515e359ccbf1a3d5d57e03cdb3441400acaa5d7e6791835c5af647e01

  • C:\Users\Admin\AppData\Roaming\HandBrake\settings.json

    Filesize

    2KB

    MD5

    c3bf76d11d6abf2d1dbf5ccb789d4b43

    SHA1

    fe5ee63e76f8f4a8317d8fff97de165b5413d457

    SHA256

    ab56570f21995186773c95ee1d132739a08ebf81fb60df9aad16e00854490f49

    SHA512

    aec1e8eabcf4ac44a7b93277e0dcc4d935245814215c761ad731004c023c079314e89b28a8be3fa84c2e859e912dd087da693c5083f0ac67350c7d4819e8bd69

  • C:\Users\Public\Desktop\HandBrake.lnk

    Filesize

    880B

    MD5

    3b29c2e6b9a502db695ed6d6c2f8165e

    SHA1

    3e09c30048300de4f96eeb4c24a37d1f72539703

    SHA256

    d2792f53e44893571eb9a215500f52bbe3cdf2f0301fd128680776d8a0fd2a5a

    SHA512

    dc10bcc9ecc2396c6f9c430877187dc933d375ebd0bd03f3b00e2ecbc076aa25639ab2858fb77818f335af2593611b97536a191f3035c8d828f62474e2274213

  • memory/1848-276-0x00007FFC6D8B0000-0x00007FFC7306F000-memory.dmp

    Filesize

    87.7MB

  • memory/1848-347-0x0000024153020000-0x00000241531D3000-memory.dmp

    Filesize

    1.7MB

  • memory/1848-346-0x00007FFC6D8B0000-0x00007FFC7306F000-memory.dmp

    Filesize

    87.7MB