Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 08:17

General

  • Target

    _Silent Update.cmd

  • Size

    1KB

  • MD5

    9add192714f7645e21ca939f159d595d

  • SHA1

    b7aeb23abbb7795917943cf11af634d645cbef35

  • SHA256

    1d433ad24bd7efbfcee720496cb557fa36bcbf6d50ad57968e988e413b359c57

  • SHA512

    aa671e8f820e2ba3c791f5bbdcbec92be58d6b0c1373c8aae42aa2b631b124255183d86ba216a4d1b23e366c3d0474b734aa963e23fb2d9aad022dba75f7c2bd

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_Silent Update.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.42.25.exe
      "Internet Download Manager 6.42.25.exe" /SILENT /UPDATE=1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Users\Admin\AppData\Local\Temp\is-A4J6S.tmp\Internet Download Manager 6.42.25.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-A4J6S.tmp\Internet Download Manager 6.42.25.tmp" /SL5="$A0188,14999154,64512,C:\Users\Admin\AppData\Local\Temp\Internet Download Manager 6.42.25.exe" /SILENT /UPDATE=1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2288
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:3868
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4584
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\idmfsa.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4704
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"
          4⤵
          • Loads dropped DLL
          PID:2236
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3352
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:4448
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4872
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:5112
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:2060
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s /u "C:\Program Files (x86)\Internet Download Manager\IDMShellExt.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2744
        • C:\Windows\SysWOW64\regedit.exe
          "C:\Windows\regedit.exe" /S "C:\Users\Admin\AppData\Local\Temp\settings.reg"
          4⤵
          • System Location Discovery: System Language Discovery
          • Runs .reg file with regedit
          PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll

    Filesize

    73KB

    MD5

    d04845fab1c667c04458d0a981f3898e

    SHA1

    f30267bb7037a11669605c614fb92734be998677

    SHA256

    33a8a6b9413d60a38237bafc4c331dfebf0bf64f8057abc335b4a6a6b95c9381

    SHA512

    ccd166dbe9aaba3795963af7d63b1a561de90153c2eaefb12f3e9f9ddebd9b1f7861ee76f45b4ef19d41ca514f3796e98b3c3660596730be8d8eb9e1048ef59e

  • C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll

    Filesize

    93KB

    MD5

    597164da15b26114e7f1136965533d72

    SHA1

    9eeaa7f7de2d04415b8c435a82ee7eea7bbf5c8a

    SHA256

    117abaeb27451944c72ffee804e674046c58d769bd2e940c71e66edec0725bd1

    SHA512

    7a2d31a1342286e1164f80c6da3a9c07418ebeafb9b4d5b702c0f03065ee26949da22193eb403c8aeec012b6f1c5ff21179104943943302972492fcdccc850d9

  • C:\Program Files (x86)\Internet Download Manager\IDMIECC.dll

    Filesize

    463KB

    MD5

    23efcfffee040fdc1786add815ccdf0a

    SHA1

    0d535387c904eba74e3cb83745cb4a230c6e0944

    SHA256

    9a9989644213043f2cfff177b907ef2bdd496c2f65803d8f158eae9034918878

    SHA512

    cf69ed7af446a83c084b3bd4b0a3dbb5f013d93013cd7f2369fc8a075fe05db511cfe6b6afdef78026f551b53ad0cb7c786193c579b7f868dd0840b53dbb5e9f

  • C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll

    Filesize

    656KB

    MD5

    e032a50d2cf9c5bf6ff602c1855d5a08

    SHA1

    f1292134eaad69b611a3d7e99c5a317c191468aa

    SHA256

    d0c6d455d067e8717efe2cfb9bdcbeae27b48830fe77e9d45c351fbfb164716d

    SHA512

    77099b44e4822b4a556b4ea6417cf0a131ffb5ee65c3f7537ab4cdc9939f806b15d21972ea4d14a0d95cf946013b9997a9127d798016f68bcd957bbffdab6c11

  • C:\Program Files (x86)\Internet Download Manager\IDMNetMon64.dll

    Filesize

    500KB

    MD5

    750e48e15233e2f27d664978f7f06b38

    SHA1

    81ccc803d79f5016bd05049724764cdc09cf1cf9

    SHA256

    e8639ec2f53d947f0400343368e60a4158332314e23adfa028f589b84c754744

    SHA512

    f318bee9af7f419329dff6d30173777d773de5603b0bf5ceef0d20e3202ddfdb47ce23cb8302d31afc23624f0c5ea76c5bcfeee30a2452fd0cce3da2e9dadd2d

  • C:\Program Files (x86)\Internet Download Manager\IDMShellExt.dll

    Filesize

    33KB

    MD5

    8ebbfdc893b3449ce9940e078e8a87ea

    SHA1

    def9a44b6901f33b0d6d06963a4b60bfa4327ae0

    SHA256

    211930e13a1270450388be5ca4e8a049f71710c53bc3983772e3613224190812

    SHA512

    b4cb33739f928d3e17eff33bf0692d49f446637bcbd1bdbdd243120c3e46537b254e62668cddc50bfccb9d52f8bde57b1bb45a26cb5dcec1e101bebaec703b5d

  • C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll

    Filesize

    36KB

    MD5

    a3c44204992e307d121df09dd6a1577c

    SHA1

    9482d8ffda34904b1dfd0226b374d1db41ca093d

    SHA256

    48e5c5916f100880e68c9e667c4457eb0065c5c7ab40fb6d85028fd23d3e4838

    SHA512

    f700cf7accab0333bc412f68cdcfb25d68c693a27829bc38a655d52cb313552b59f9243fc51357e9dccd92863deecb529cc68adbc40387aad1437d625fd577f1

  • C:\Program Files (x86)\Internet Download Manager\downlWithIDM.dll

    Filesize

    197KB

    MD5

    b94d0711637b322b8aa1fb96250c86b6

    SHA1

    4f555862896014b856763f3d667bce14ce137c8b

    SHA256

    38ac192d707f3ec697dd5fe01a0c6fc424184793df729f427c0cf5dfab6705fe

    SHA512

    72cdb05b4f45e9053ae2d12334dae412e415aebd018568c522fa5fe0f94dd26c7fe7bb81ccd8d6c7b5b42c795b3207dffa6345b8db24ce17beb601829e37a369

  • C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll

    Filesize

    155KB

    MD5

    13c99cbf0e66d5a8003a650c5642ca30

    SHA1

    70f161151cd768a45509aff91996046e04e1ac2d

    SHA256

    8a51ece1c4c8bcb8c56ca10cb9d97bff0dfe75052412a8d8d970a5eb6933427b

    SHA512

    f3733ef2074f97768c196ad662565b28e9463c2c8cf768166fed95350b21c2eb6845d945778c251093c00c65d7a879186843eb334a8321b9956738d9257ce432

  • C:\Program Files (x86)\Internet Download Manager\idmfsa.dll

    Filesize

    90KB

    MD5

    79fef25169ac0a6c61e1ed17409f8c1e

    SHA1

    c19f836fca8845adf9ae21fb7866eedb8c576eb8

    SHA256

    801d3a802a641212b54c9f0ef0d762b08bcca9ab4f2c8603d823a1c1bc38c75a

    SHA512

    49bf489d6836b4327c6ebad722f733f66722aadb89c4eac038231e0f340d48bb8c4fe7ce70437213a54e21bce40a4a564a72a717f67e32af09b3f9aa59050aab

  • C:\Users\Admin\AppData\Local\Temp\is-A4J6S.tmp\Internet Download Manager 6.42.25.tmp

    Filesize

    911KB

    MD5

    4a6c1b37772b488d1bdff1eb6e589118

    SHA1

    e89a6b43b8fb61f988779c0bc3bd421090424d53

    SHA256

    109e48992f332ddde3f2ff8ea6459f11eff3d7968dab4951dc96ed7507f1bbf6

    SHA512

    132ff049d9d2d2dca20084f4fa1b3ebf059ccfbc0c5b0b29fabf78543896fb9e18d0dd2255f6bbbd5c637d5c6d405fd07ebd247c77bf751e0d8758cd8eda73cb

  • C:\Users\Admin\AppData\Local\Temp\is-JG7P9.tmp\ISTask.dll

    Filesize

    66KB

    MD5

    86a1311d51c00b278cb7f27796ea442e

    SHA1

    ac08ac9d08f8f5380e2a9a65f4117862aa861a19

    SHA256

    e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d

    SHA512

    129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec

  • C:\Users\Admin\AppData\Local\Temp\is-JG7P9.tmp\VclStylesInno.dll

    Filesize

    3.0MB

    MD5

    b0ca93ceb050a2feff0b19e65072bbb5

    SHA1

    7ebbbbe2d2acd8fd516f824338d254a33b69f08d

    SHA256

    0e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246

    SHA512

    37242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2

  • memory/1440-47-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-39-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-78-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-77-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-76-0x0000000007A60000-0x0000000007A61000-memory.dmp

    Filesize

    4KB

  • memory/1440-75-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-74-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-73-0x0000000007A50000-0x0000000007A51000-memory.dmp

    Filesize

    4KB

  • memory/1440-71-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-70-0x0000000007A40000-0x0000000007A41000-memory.dmp

    Filesize

    4KB

  • memory/1440-69-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-68-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-67-0x0000000007A30000-0x0000000007A31000-memory.dmp

    Filesize

    4KB

  • memory/1440-66-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-65-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-64-0x0000000007A20000-0x0000000007A21000-memory.dmp

    Filesize

    4KB

  • memory/1440-63-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-62-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-54-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-61-0x0000000007A10000-0x0000000007A11000-memory.dmp

    Filesize

    4KB

  • memory/1440-60-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-59-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-58-0x0000000007A00000-0x0000000007A01000-memory.dmp

    Filesize

    4KB

  • memory/1440-57-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-56-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-55-0x00000000079F0000-0x00000000079F1000-memory.dmp

    Filesize

    4KB

  • memory/1440-51-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-50-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-48-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-80-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-82-0x0000000007A80000-0x0000000007A81000-memory.dmp

    Filesize

    4KB

  • memory/1440-44-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-72-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-43-0x00000000079B0000-0x00000000079B1000-memory.dmp

    Filesize

    4KB

  • memory/1440-42-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-41-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-40-0x00000000079A0000-0x00000000079A1000-memory.dmp

    Filesize

    4KB

  • memory/1440-79-0x0000000007A70000-0x0000000007A71000-memory.dmp

    Filesize

    4KB

  • memory/1440-38-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-37-0x0000000007990000-0x0000000007991000-memory.dmp

    Filesize

    4KB

  • memory/1440-35-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-34-0x0000000007980000-0x0000000007981000-memory.dmp

    Filesize

    4KB

  • memory/1440-32-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-49-0x00000000079D0000-0x00000000079D1000-memory.dmp

    Filesize

    4KB

  • memory/1440-46-0x00000000079C0000-0x00000000079C1000-memory.dmp

    Filesize

    4KB

  • memory/1440-87-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-45-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-90-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-89-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-88-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-28-0x0000000007960000-0x0000000007961000-memory.dmp

    Filesize

    4KB

  • memory/1440-27-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-26-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-91-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-36-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-33-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-31-0x0000000007970000-0x0000000007971000-memory.dmp

    Filesize

    4KB

  • memory/1440-30-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-29-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-83-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-81-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-84-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-53-0x0000000007800000-0x0000000007940000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-52-0x00000000079E0000-0x00000000079E1000-memory.dmp

    Filesize

    4KB

  • memory/1440-25-0x0000000007950000-0x0000000007951000-memory.dmp

    Filesize

    4KB

  • memory/1440-23-0x00000000074E0000-0x00000000077FA000-memory.dmp

    Filesize

    3.1MB

  • memory/1440-17-0x00000000072B0000-0x00000000072C6000-memory.dmp

    Filesize

    88KB

  • memory/1440-433-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-514-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-11-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/1440-547-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/4884-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4884-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB