Analysis
-
max time kernel
139s -
max time network
194s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17-05-2021 04:24
Static task
static1
Behavioral task
behavioral1
Sample
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
Resource
win10v20210410
General
-
Target
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
-
Size
421KB
-
MD5
c5772cc7dce580af79be14997361f7d1
-
SHA1
1c3831dad29e13a5f49257710d03fe9fc54a76ae
-
SHA256
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371
-
SHA512
6bed43fd3e2c05a03913b4197b9d9a0d5270c56a5aca18ab1b1346b24a1218c1fe484d8ae50c5f615901039bcf5007bcfd5639e661bbe46b3b9cad74e8800473
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00040000000130cc-59.dat acprotect -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130cc-59.dat upx -
Loads dropped DLL 5 IoCs
pid Process 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1092 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe Token: 33 1896 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1896 AUDIODG.EXE Token: 33 1896 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1896 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe"C:\Users\Admin\AppData\Local\Temp\1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896