Analysis
-
max time kernel
30s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 20:02
Behavioral task
behavioral1
Sample
bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe
Resource
win10v2004-20220812-en
General
-
Target
bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe
-
Size
34KB
-
MD5
e70f4d4526ff3e94198607778bebe542
-
SHA1
448ffcb13b7f4ee08e792be960cca3a50fc15724
-
SHA256
bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9
-
SHA512
98a109298bc906c4907b3419b902b6077f6f704011ee67c9190eca3f5b6bea5f06ceaa640c8f37e95f3fe6d50f546b4cc1c0a5d9e3f5372e63bb57b9b09725bf
-
SSDEEP
768:zkvqIj718xS/D1/abhXT3EOuJE1JzUQqgSRWPmDXKes:nboA97EvwdUQqVLZs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000012758-55.dat acprotect -
resource yara_rule behavioral1/files/0x0009000000012758-55.dat upx behavioral1/memory/1384-56-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1384-57-0x00000000001C0000-0x00000000001D3000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1384 bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\MoWang.sys bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe File created C:\Program Files\Internet Explorer\MoWang.tdm bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe File created C:\Program Files\Internet Explorer\MoWang.sys bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1384 bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe"C:\Users\Admin\AppData\Local\Temp\bd21f76804575dc44c0d2a21e5c9e12aa85e29bca5b545469c4e614ae5c935f9.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1384
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5c873d4ae9b7f28b4994164d50393bc96
SHA13cc5b2579b7833513ac7e152248caf1218e5400d
SHA2566e576c609ffa1ba95c211a352b3947f8e01464475aaf3e5e47ea60c6f432252c
SHA5128bcfd3263ebe123a6f1eee25736a4e56036eca89c5f0b88a7b65369252d73bf3c0e6235541a397dc23accc977f36f11908f3cea8ae49f0b9167370c7aaf90ad1