Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 23:10
Behavioral task
behavioral1
Sample
bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe
Resource
win10v2004-20220812-en
General
-
Target
bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe
-
Size
103KB
-
MD5
b1481280f045a2320f182050a997cf70
-
SHA1
bdd776eadbbe9437bac26e1b8495e59e8f0b15df
-
SHA256
bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe
-
SHA512
0c627fa02b468ebbffe4a31e6ae5da50a806ab460fe6c32fb75785f0cf165e4b4a519c8b50c614e7ca56d9fcb1ef671465bf43b6d8329a42cc6ccc862c1abf4a
-
SSDEEP
1536:U3TJJbyJBDFfBcMCmVE8d425I9lZF2UYIVGXTL29H6TKirhT+KUBPwVAGkqT33:UjJgVB8PZ9lZFpDVGX216H9+y33
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022f67-134.dat acprotect behavioral2/files/0x0007000000022f67-133.dat acprotect behavioral2/files/0x0007000000022f67-140.dat acprotect behavioral2/files/0x0007000000022f67-139.dat acprotect behavioral2/files/0x0007000000022f67-138.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3184 svchost.exe -
resource yara_rule behavioral2/memory/904-132-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/files/0x0007000000022f67-134.dat upx behavioral2/files/0x0007000000022f67-133.dat upx behavioral2/files/0x0008000000022f5f-136.dat upx behavioral2/files/0x0008000000022f5f-137.dat upx behavioral2/files/0x0007000000022f67-140.dat upx behavioral2/files/0x0007000000022f67-139.dat upx behavioral2/files/0x0007000000022f67-138.dat upx behavioral2/memory/904-141-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/3184-142-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/3184-145-0x0000000000400000-0x000000000043F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 3184 svchost.exe 3184 svchost.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\L: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\P: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\S: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\U: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\K: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\N: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\Q: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\T: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\F: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\I: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\O: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\R: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\G: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\H: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\J: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\M: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened (read-only) \??\V: bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\DOROPK.dll bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe File opened for modification C:\Windows\SysWOW64\DOROPK.dll bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1007PV\DFile = "052044077052044072103167048044098122038066066191166159043043144010101052075166085078204148059243106146050187102062132156147234170" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ = "Maihook1007" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32\ThreadingModel = "Apartment" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\Clsid svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ProgID\ = "DOROPK.ShellExecuteHook1007" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2} bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\Clsid bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\ = "Maihook1007" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ProgID bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1007PV svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ProgID svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1007PV\EFile = "050034083052034078219012048033103245073066225060117161117080211155215050132001169234107055021" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32\ThreadingModel = "Apartment" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\ = "Maihook1007" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\Clsid\ = "{36429484-6478-41B2-A32B-FD0B4BBF04B2}" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1007PV bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\DOROPK.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\DOROPK.dll" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DOROPK.ShellExecuteHook1007\Clsid\ = "{36429484-6478-41B2-A32B-FD0B4BBF04B2}" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ProgID\ = "DOROPK.ShellExecuteHook1007" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\ = "Maihook1007" bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36429484-6478-41B2-A32B-FD0B4BBF04B2}\InprocServer32 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 904 wrote to memory of 3184 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 78 PID 904 wrote to memory of 3184 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 78 PID 904 wrote to memory of 3184 904 bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe"C:\Users\Admin\AppData\Local\Temp\bdb6672d339d6fc19af420865d8731a183c082f03b77b7b33811ffbf5d7b09fe.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\odt\svchost.exeC:\odt\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5018f4c326f6de04e824ccdad8bee8f51
SHA1cf2d330ff2863af8dee4f17c184b71072a0f1302
SHA256cdf7c071cd1e571c43c5cc29ceb596f2d9281c62d364e4820815a04bb2c736d9
SHA512b91505789ff2a93cdb5f905a202e83505210d2dcea9a0358ba458a3bb22722e6274c1d9a2aae49d3d50711a7f24f8bdd1e67964ff238ec01125290a83e6e95db
-
Filesize
150KB
MD5018f4c326f6de04e824ccdad8bee8f51
SHA1cf2d330ff2863af8dee4f17c184b71072a0f1302
SHA256cdf7c071cd1e571c43c5cc29ceb596f2d9281c62d364e4820815a04bb2c736d9
SHA512b91505789ff2a93cdb5f905a202e83505210d2dcea9a0358ba458a3bb22722e6274c1d9a2aae49d3d50711a7f24f8bdd1e67964ff238ec01125290a83e6e95db
-
Filesize
150KB
MD5018f4c326f6de04e824ccdad8bee8f51
SHA1cf2d330ff2863af8dee4f17c184b71072a0f1302
SHA256cdf7c071cd1e571c43c5cc29ceb596f2d9281c62d364e4820815a04bb2c736d9
SHA512b91505789ff2a93cdb5f905a202e83505210d2dcea9a0358ba458a3bb22722e6274c1d9a2aae49d3d50711a7f24f8bdd1e67964ff238ec01125290a83e6e95db
-
Filesize
150KB
MD5018f4c326f6de04e824ccdad8bee8f51
SHA1cf2d330ff2863af8dee4f17c184b71072a0f1302
SHA256cdf7c071cd1e571c43c5cc29ceb596f2d9281c62d364e4820815a04bb2c736d9
SHA512b91505789ff2a93cdb5f905a202e83505210d2dcea9a0358ba458a3bb22722e6274c1d9a2aae49d3d50711a7f24f8bdd1e67964ff238ec01125290a83e6e95db
-
Filesize
150KB
MD5018f4c326f6de04e824ccdad8bee8f51
SHA1cf2d330ff2863af8dee4f17c184b71072a0f1302
SHA256cdf7c071cd1e571c43c5cc29ceb596f2d9281c62d364e4820815a04bb2c736d9
SHA512b91505789ff2a93cdb5f905a202e83505210d2dcea9a0358ba458a3bb22722e6274c1d9a2aae49d3d50711a7f24f8bdd1e67964ff238ec01125290a83e6e95db
-
Filesize
103KB
MD581ed2bb35c31f6b48e3d5dd79352d9de
SHA194adb7be20690132c792fa0c53520183cace6c33
SHA2561078dfe24e0a91560f0c2f00d37e8e744a4c0cf104e5da26cb57ce2d40a17a60
SHA512d105cb356e7175bec565f9d5e30d53f9f1f2c81e5aee49c0bd2fbc906cdff30b4f396d0d2770fc183b34166c4cbf91fc542c813a3ed4443b0504f578dda6b0f9
-
Filesize
103KB
MD581ed2bb35c31f6b48e3d5dd79352d9de
SHA194adb7be20690132c792fa0c53520183cace6c33
SHA2561078dfe24e0a91560f0c2f00d37e8e744a4c0cf104e5da26cb57ce2d40a17a60
SHA512d105cb356e7175bec565f9d5e30d53f9f1f2c81e5aee49c0bd2fbc906cdff30b4f396d0d2770fc183b34166c4cbf91fc542c813a3ed4443b0504f578dda6b0f9