Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
17-05-2021 04:24
Static task
static1
Behavioral task
behavioral1
Sample
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
Resource
win10v20210410
General
-
Target
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
-
Size
421KB
-
MD5
c5772cc7dce580af79be14997361f7d1
-
SHA1
1c3831dad29e13a5f49257710d03fe9fc54a76ae
-
SHA256
1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371
-
SHA512
6bed43fd3e2c05a03913b4197b9d9a0d5270c56a5aca18ab1b1346b24a1218c1fe484d8ae50c5f615901039bcf5007bcfd5639e661bbe46b3b9cad74e8800473
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000000689-114.dat acprotect -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/files/0x0008000000000689-114.dat upx -
Loads dropped DLL 9 IoCs
pid Process 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\symsrv.dll.000 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe File created C:\Program Files\Common Files\System\symsrv.dll 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe"C:\Users\Admin\AppData\Local\Temp\1d12af334a427a690811c675e7c5981352d237741473480c7d4d4f0abdf5e371.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656