Overview
overview
9Static
static
9ASYCFILT.DLL
windows7_x64
3ASYCFILT.DLL
windows10_x64
3MDAC_TYP.EXE
windows7_x64
8MDAC_TYP.EXE
windows10_x64
8Resultados.exe
windows7_x64
1Resultados.exe
windows10_x64
1SETUP1.EXE
windows7_x64
3SETUP1.EXE
windows10_x64
3ST6UNST.EXE
windows7_x64
1ST6UNST.EXE
windows10_x64
1configura.exe
windows7_x64
1configura.exe
windows10_x64
1setup.exe
windows7_x64
8setup.exe
windows10_x64
8Analysis
-
max time kernel
10s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-04-2021 18:33
Static task
static1
Behavioral task
behavioral1
Sample
ASYCFILT.DLL
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ASYCFILT.DLL
Resource
win10v20210410
Behavioral task
behavioral3
Sample
MDAC_TYP.EXE
Resource
win7v20210408
Behavioral task
behavioral4
Sample
MDAC_TYP.EXE
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Resultados.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Resultados.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
SETUP1.EXE
Resource
win7v20210410
Behavioral task
behavioral8
Sample
SETUP1.EXE
Resource
win10v20210408
Behavioral task
behavioral9
Sample
ST6UNST.EXE
Resource
win7v20210410
Behavioral task
behavioral10
Sample
ST6UNST.EXE
Resource
win10v20210408
Behavioral task
behavioral11
Sample
configura.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
configura.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
setup.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
setup.exe
Resource
win10v20210410
General
-
Target
MDAC_TYP.EXE
-
Size
7.7MB
-
MD5
eb58dba7f3fc9d8ba0d486d8e08b60e5
-
SHA1
05ac649932a05297cdbba554f5d3349bb5beac36
-
SHA256
dc14f8710e7281a5e1722edb53fa397e29405e9e2be8afa17716aad9b1c13782
-
SHA512
738d2c1badb587aa81e732685aacfa4f32cc8ae8ad2f5bdcb9b896000d6c24a8bbbe987b7f28e8526bbef4b2d8cdf6ff5af52083bbcbfcc3a4a2a58890d5de5e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
acmsetup.exepid process 1764 acmsetup.exe -
Loads dropped DLL 5 IoCs
Processes:
setup16.exeacmsetup.exepid process 1072 setup16.exe 1764 acmsetup.exe 1764 acmsetup.exe 1764 acmsetup.exe 1764 acmsetup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
MDAC_TYP.EXEdescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce MDAC_TYP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" MDAC_TYP.EXE -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
setup16.exedescription ioc process File opened (read-only) \??\I: setup16.exe File opened (read-only) \??\G: setup16.exe File opened (read-only) \??\E: setup16.exe File opened (read-only) \??\Y: setup16.exe File opened (read-only) \??\V: setup16.exe File opened (read-only) \??\O: setup16.exe File opened (read-only) \??\J: setup16.exe File opened (read-only) \??\W: setup16.exe File opened (read-only) \??\T: setup16.exe File opened (read-only) \??\Q: setup16.exe File opened (read-only) \??\P: setup16.exe File opened (read-only) \??\N: setup16.exe File opened (read-only) \??\L: setup16.exe File opened (read-only) \??\Z: setup16.exe File opened (read-only) \??\X: setup16.exe File opened (read-only) \??\U: setup16.exe File opened (read-only) \??\R: setup16.exe File opened (read-only) \??\K: setup16.exe File opened (read-only) \??\H: setup16.exe File opened (read-only) \??\S: setup16.exe File opened (read-only) \??\M: setup16.exe File opened (read-only) \??\F: setup16.exe -
Drops file in System32 directory 1 IoCs
Processes:
acmsetup.exedescription ioc process File created C:\Windows\SysWOW64\ta01764 acmsetup.exe -
Modifies registry class 6 IoCs
Processes:
setup16.exeacmsetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME) setup16.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper setup16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "Running" setup16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "2" acmsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level\ = "Running" acmsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MS Setup (ACME)\Bootstrapper\Exit Level setup16.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
MDAC_TYP.EXEsetup16.exedescription pid process target process PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1624 wrote to memory of 1072 1624 MDAC_TYP.EXE setup16.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe PID 1072 wrote to memory of 1764 1072 setup16.exe acmsetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MDAC_TYP.EXE"C:\Users\Admin\AppData\Local\Temp\MDAC_TYP.EXE"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\setup16.exesetup -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"2⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\~MSSETUP.T\~mdac.t\acmsetup.exeC:\~MSSETUP.T\~mdac.t\acmsetup /t mdac_typ.stf /S C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9affddc9de4ba7f5385ccc2801b52ade
SHA115de16c5d5cc4af98b7d33a4950cf9c0380a57a3
SHA25682954440bf5bf4dd63c4301e6587d98cc816fb94f2e8c4d88bce2ff55d859ec1
SHA512995a3ac82e418866dce4e971b322c9004d2f7722a2b93d5503a0fc87b4791721687881c16c17f256b743ec78591482c35f0495936a0fdc2c3bd8a22469737848
-
MD5
a88346c7d3c20df8ee796012330b6fc2
SHA1d0c1593845a67e760aa0ffb2b3c391e295f10f45
SHA2568878e1e600abeb4bd7324a8435f8ffcaea438743bdc9e0da154bdcf8ecc879a3
SHA5121a5ba18969dd1067b0c2dfebb84f09f121698c7290e5a5ccabb1c82aaeffa567f25947243a66d3584516791aee33f066651f044e5de6dfcd73bcdb82f866853c
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
73c25ae0c1769d5f9224c42918b1e02c
SHA183e8a696e68afdb91de5068fa1b4006a81c47ab4
SHA256bb01707fe351952e3719fafa3361642b81069733e6ce83b06b78ddc779eaaea8
SHA51249e969711a06c4f8f42ff0992d0fb51e3c57acce4f2d3d02cd2a51a4147ac7360b54233c0036d6f148001fdf599cdf176fbdc111f3096edf05d7b8e275d1cc39
-
MD5
81e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
MD5
2afc512e9c0b08f6e68f64c14e2ac604
SHA141b90f7d06550b9f2502ed8b32534a38a7687c11
SHA2562dbc87859812b6b6984cab01814a662fec2cc69560e8c1969abe58cc0d0d957d
SHA512a6a2c6324626d3d6d5b89fbee6fa7ec5793f4b297f9ff8b63bd6603a5cdde6c961636afff99522979c75a9375463e2ea128bda3e40225204f3a4d314f0a9fc5a
-
MD5
bb3291b2addc51860d724e44460a50ba
SHA158055cc8a1f8aef5e075ee34b943ef4d8c30c08b
SHA25663c50edecc6d5c1df94fbc9ccb0c88b8e8486be77681196e7b61c4b3afacd75c
SHA51202b7df2a8f1f450dce8dfa91792bbf3e8d96138c945057971e7da3e9edf37658b0d8ddd735a423cce008a9c626fa3011cbdb17437086a699d88ab52f9bfc44f9
-
MD5
04779a4e3826b45173c9a36576d51a81
SHA14981a701128a15a87a2c4a70f73fa25ba253738a
SHA256ed001bf50f66901c40a01326405638185a8604caa045bb0fef8402bfdb59bbb1
SHA5129eb6db77c4328222f8fd37f3f4e9821ac9e7c54c6104485ae2c8453132b83fa04adb7c9502b62afb7808f55c1548edf9270928ac3470b38120a83da973f5d88f
-
MD5
b7bacd398e382b3e5998bb2053625563
SHA121fd13e22f06ffa87d373e131973738fafc8502e
SHA256666781754d3365d1d7ce632bf2fe67bc803ccdc754a5013471dcb9e73c7815df
SHA51216894a80add250edb205ac2b414cc632b49b24a26e06acf8f186eed0794e619ce3d8c02d8f056b5c47b26ef7de4dbce327df4fce95f4b25e449da3649d40776d
-
MD5
d5d072540f69cdcae1ddec6f116ea65a
SHA10e105e6968d868ba23b13d9eb1e83a34c2015aea
SHA256b9b3abb404481d98b0cb8ec3dd728f12a3f2505d4cc7e4c59e8509abfa694710
SHA51264748600aa32181d7ce5ad82238bc84606931275aff58858578fd9bc5c01fa7809c095195939c3811e91362f2470abeebccd93ed7921bd3342f7fe13a96fac66
-
MD5
779c065d6bf4b0d5c3f7edbb4248b84c
SHA112607c24cc7faf12e66de07163dd591f46473880
SHA2563ef37b982dc58b12f72c978e0bdc19f6af74fd2a582818788d422b6914c0698d
SHA5128b1ad291e6eca82cd3d63637ad14d6f5a1a27566c3ed59cced7591134719acd25f15865ac06e4c17d0d0cac546bdbfcc082ac6bf79da3ef898a3a2018cd98b9e
-
MD5
08f4182e94ea4cd41ff12ecf8ef83556
SHA117baed3cfe30d4cf41e01167ca67c88e7f22b30d
SHA256aca13860b6a02749fe42e0f8cd856787065688071a27a7fb78cbba445a22c435
SHA5121d5daf32a08bf3f15737582a33ec879d8b7b8eb4c5333a360c80de2b76580582a0bc4871b09c23e0a0bbe8fca46ab735599338029af5f37e9e23c4b183b641c8
-
MD5
c750112871fc7d6a37b9db626d2acce4
SHA1ae5d8fc99ee00698cdd853d096aaf46db7801306
SHA25613c8f2c4daade76c7e4ad4a4352d46fce89abd06857f2c76347945eb230ea387
SHA512f05875b3cf2890a083480373ee15ec468b5d2df7385aedf0eb73e8c15551550738fbfeaf51875aaf80534c90a3dff08bd1fe6c31eb478b922d2cf010bab892e3
-
MD5
933be9555b1ba4abf3ac8956511e0ed2
SHA10fd746bbc8465cae825f50e84139c3444fb9e2b6
SHA2566eaf180fd595d8e572da8c1739d0f231ee462951cd73b84e575082f905e5b50b
SHA5124f51166976617322c4c91a80668931b515c68e3732e1c6deb2acd44c34dcb13fd99e0f865448900b6bc35d2bc6a983a252dff7228177c53f4ba159eef51ad421
-
MD5
6c58ec355ade4b1d14d59560b8e57c5e
SHA1b8a3cdadd63c1857903b78af2b33dfd8ebdb8572
SHA256f595054f3a56c87559e384a3ee942821768a49e78ed093221cb6badc022551e9
SHA5127f56c48e34e1c984eed6ac06eee25e714a4aa93f08a3b5b5a45f8af729e167f6f60bbdd6b27763ee858e90d78de01058736f2ed7bb2465ca9cb2ee1f728cf58d
-
MD5
8a167d44d02c33aa5d8e52716e2c38cf
SHA1792a2dcba28f5a9cbc1611e79ad1d594ad39ff7c
SHA256f765a7227d81020b1c69359fe014ca941db5390660513f0070f27e3259aad716
SHA512c28b024aedc28c706d2217c39354bfbc45d3071e783719d514c7c5db42bd8f3528ce4d9484c656b208be615eeadbb9de144bb9f87265a1c237fdaae2490e3310
-
MD5
9e68f82c086bfcec7468e276cd257367
SHA16ad8c341ae909676e68285e23aa3c4742820ea38
SHA256220dce873eb69e71935bf53068f7e33a44cf500c87106631eb5aca448fc61a2e
SHA5124bcddc1f5aa90fdf97bb635fed9699cf2249e36cca8b18a3961e472dff58c956898863677686cfeaef26156f6af704256a420ded585ccffdf30b2b0a3e7e6470
-
MD5
b6873acd87663d9e22725670911b586b
SHA1f146352286dfd8145a9d5064ad81b499ec523f2f
SHA2565cc36ea73ca05fe2b5784332b6452ec4b1625905059e973072c62cdaf503f2c4
SHA51266e66b07039a447907bc9a7d7d08a903bc58a204a32f1c37d95dc48bb37ce180127fa46249cd4a2b4c3759a4423e5f1ed11c9e77369754c182812c3199c366a2
-
MD5
dd74ecbc7334882c5042861d747c45d9
SHA1936f8bd60ccdf3af7f8b656feb2b12502152dbd4
SHA256660a977edbfafbb2e706d5a9854839bd6b335295489a0550767a948ee1358243
SHA51264ef77f1bbc1e16c630082771f36d1dfb8e6c38b725ab31c961d7a6c1da67993bc23d32180937ec1bdaba8df8307c0b67a2ca9f64d68b084a13a5e016401ebd0
-
MD5
eafa2804a87078afc643f8148dd8ec78
SHA15480542cf7b3bc18735044116acc6a341734ae71
SHA256e40a42fafeb4d353f54aa766714577a14956c063450058cb70d48b41f5739063
SHA51250fffecff1dd81bf7d851b38c809f3a20a4c224e80954fdbe53bca6e92d96ed1f8aa542cd22eea57f4ed1a8533f3fb9de500dd6d1f0a071529fd9587d7c07ee7
-
MD5
6822179556122e9bbca69d177e24ca36
SHA12669511fb9f2373546b45680b46b59c29bece8f3
SHA256194250402400908a1051115b5a05d18473d0f8f8e9dfffdb10b23b583987b765
SHA512439893a10338d77f8b1f0302034894a699d50c25500405350e717cb9a24c08efeb5d0a5367ae07d64cb2e66e8b8419b80429206b244243a0d0b3f4f65072013b
-
MD5
0bc2472ec42a4fc4742c817b121a0c57
SHA17328477a9f2311d9e4d72e1ea261031fbb19fc92
SHA2560879e69ee425d61731589b4331358d20248c58362dd636f84b5a513f0aa4bd81
SHA512cccfad839371a41e8ca65e57165beb55059580cdfc8abb4b73e60823ca95473783aff6e02997b6a506ff6ebb5eaff86737e9db19fc4cbe06574f9224f04d7376
-
MD5
7210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
MD5
4be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
MD5
d5d072540f69cdcae1ddec6f116ea65a
SHA10e105e6968d868ba23b13d9eb1e83a34c2015aea
SHA256b9b3abb404481d98b0cb8ec3dd728f12a3f2505d4cc7e4c59e8509abfa694710
SHA51264748600aa32181d7ce5ad82238bc84606931275aff58858578fd9bc5c01fa7809c095195939c3811e91362f2470abeebccd93ed7921bd3342f7fe13a96fac66
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
04779a4e3826b45173c9a36576d51a81
SHA14981a701128a15a87a2c4a70f73fa25ba253738a
SHA256ed001bf50f66901c40a01326405638185a8604caa045bb0fef8402bfdb59bbb1
SHA5129eb6db77c4328222f8fd37f3f4e9821ac9e7c54c6104485ae2c8453132b83fa04adb7c9502b62afb7808f55c1548edf9270928ac3470b38120a83da973f5d88f
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
9b658a7e2ce494d53e79392ed7400f68
SHA178ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1
SHA25665ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2
SHA5129fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159
-
MD5
d5d072540f69cdcae1ddec6f116ea65a
SHA10e105e6968d868ba23b13d9eb1e83a34c2015aea
SHA256b9b3abb404481d98b0cb8ec3dd728f12a3f2505d4cc7e4c59e8509abfa694710
SHA51264748600aa32181d7ce5ad82238bc84606931275aff58858578fd9bc5c01fa7809c095195939c3811e91362f2470abeebccd93ed7921bd3342f7fe13a96fac66