Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-03-2021 09:49

General

  • Target

    447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8.exe

  • Size

    618KB

  • MD5

    fa441d64d6ff82b1720ad98b1140f955

  • SHA1

    0afa7eb0fb26f69ca0146c68d2b7d84c2ad5078e

  • SHA256

    447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8

  • SHA512

    606dd4e96f435665b29c8254ef143e0c303c0304e452f2bf1d3206ef0803ae920885e4c751c2a9a5f4a93103bc5b81c9fdebb9289fbd1d3e13a1dbc32e838e4e

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8.exe
    "C:\Users\Admin\AppData\Local\Temp\447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    PID:1400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-8-0x0000000006961000-0x0000000006966000-memory.dmp

    Filesize

    20KB

  • memory/1400-11-0x0000000006971000-0x0000000006975000-memory.dmp

    Filesize

    16KB

  • memory/1400-5-0x0000000006931000-0x0000000006935000-memory.dmp

    Filesize

    16KB