Overview
overview
10Static
static
10FD4DC9B2BF...4B.exe
windows7-x64
1FD4DC9B2BF...4B.exe
windows10-2004-x64
1Flyper.exe
windows7-x64
1Flyper.exe
windows10-2004-x64
1Flyper2.exe
windows7-x64
1Flyper2.exe
windows10-2004-x64
1Flyper3.exe
windows7-x64
1Flyper3.exe
windows10-2004-x64
1Free YouTu...er.exe
windows7-x64
3Free YouTu...er.exe
windows10-2004-x64
3FreeYoutub...16.exe
windows7-x64
7FreeYoutub...16.exe
windows10-2004-x64
7file (1).exe
windows7-x64
10file (1).exe
windows10-2004-x64
10file (2).exe
windows7-x64
6file (2).exe
windows10-2004-x64
10file (3).exe
windows7-x64
10file (3).exe
windows10-2004-x64
10file (4).exe
windows7-x64
10file (4).exe
windows10-2004-x64
10file (6).exe
windows7-x64
10file (6).exe
windows10-2004-x64
10file (7).exe
windows7-x64
1file (7).exe
windows10-2004-x64
3file.exe
windows7-x64
5file.exe
windows10-2004-x64
5file_ (1).exe
windows7-x64
7file_ (1).exe
windows10-2004-x64
7file_ (2).exe
windows7-x64
7file_ (2).exe
windows10-2004-x64
7file_ (3).exe
windows7-x64
7file_ (3).exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:43
Behavioral task
behavioral1
Sample
FD4DC9B2BFF8D75A704E8FE33C63DA4B.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FD4DC9B2BFF8D75A704E8FE33C63DA4B.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Flyper.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Flyper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Flyper2.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Flyper2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Flyper3.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Flyper3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Free YouTube Downloader.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Free YouTube Downloader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FreeYoutubeDownloader11012016.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FreeYoutubeDownloader11012016.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
file (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
file (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
file (2).exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
file (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
file (3).exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
file (3).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
file (4).exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
file (4).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
file (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
file (6).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
file (7).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
file (7).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
file.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
file_ (1).exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
file_ (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
file_ (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
file_ (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
file_ (3).exe
Resource
win7-20241023-en
General
-
Target
FreeYoutubeDownloader11012016.exe
-
Size
376KB
-
MD5
8731c5b9c6b632517b757219113dd853
-
SHA1
732c867995bcf67eb6f0e21f3c76e5428ceb8a71
-
SHA256
1e307799a25403c465d634854a10ee9329aef33a06ec41538264f8ec6695b8c7
-
SHA512
25350e182d17d5d568287ef9bf173823d4fc4e3d90aff13d2108ee99fd9ccdf5c8b13bff5353ced1b61a91942b0ebdc42ec770bc9fe9f9102d877d2fa5760aff
-
SSDEEP
6144:m/QiQXk4oL8+Ee0CYDTAsdR9H8RMDgxqvUUl49EcATvx04/o7+ze4S62T3hG47no:eQi94oL8+iDNdRNUkg0UUl42cATvxsZe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
FreeYoutubeDownloader11012016.tmppid process 4012 FreeYoutubeDownloader11012016.tmp -
Loads dropped DLL 2 IoCs
Processes:
FreeYoutubeDownloader11012016.tmppid process 4012 FreeYoutubeDownloader11012016.tmp 4012 FreeYoutubeDownloader11012016.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FreeYoutubeDownloader11012016.exeFreeYoutubeDownloader11012016.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FreeYoutubeDownloader11012016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FreeYoutubeDownloader11012016.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
FreeYoutubeDownloader11012016.exedescription pid process target process PID 3824 wrote to memory of 4012 3824 FreeYoutubeDownloader11012016.exe FreeYoutubeDownloader11012016.tmp PID 3824 wrote to memory of 4012 3824 FreeYoutubeDownloader11012016.exe FreeYoutubeDownloader11012016.tmp PID 3824 wrote to memory of 4012 3824 FreeYoutubeDownloader11012016.exe FreeYoutubeDownloader11012016.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\FreeYoutubeDownloader11012016.exe"C:\Users\Admin\AppData\Local\Temp\FreeYoutubeDownloader11012016.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\is-OLRT4.tmp\FreeYoutubeDownloader11012016.tmp"C:\Users\Admin\AppData\Local\Temp\is-OLRT4.tmp\FreeYoutubeDownloader11012016.tmp" /SL5="$7002C,138429,56832,C:\Users\Admin\AppData\Local\Temp\FreeYoutubeDownloader11012016.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
692KB
MD52c10db017057dce22651243244e4fee6
SHA1b8ea54a0cbfa98bb866d19e5b800769eea24e881
SHA256e442e83c27e94bc37eb6c02411a88edd8cb83777d50312b9ef7bfc214c4cc7b2
SHA5125f9e014129e4077e8e4745ddc8580890048f09f458d2dee2f3833931e29b6be89cfc7ef71a5837689dd3d25882ef0601ac13ddf36a2b8805092d7cd956e5c8ac