Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 12:22

General

  • Target

    c2385103a26e7c343f33958af079faab59d8083857f0c4e65d0b851007beffc1.exe

  • Size

    1.2MB

  • MD5

    66fd96bb1de69f20e34df8f9ca44230e

  • SHA1

    85e856b42649f3a8de968fa76eb50bc6fdf064f3

  • SHA256

    c2385103a26e7c343f33958af079faab59d8083857f0c4e65d0b851007beffc1

  • SHA512

    ab3c3f6b858e407ae8edbcb8a0a2acb3adb417cb13ebd432e7d251333fa5f969071b96cd95dfe205032ca69bc31f8c591353f1ff5c2eeaf6300d34b4a9699ad9

  • SSDEEP

    24576:cze1FSOEEJpcnZDpwcav6XDhUioU0LmTMMMMMMMMMMMMMMMMMMJSjnJs:6e1FSOEUCnIc86T+iHJMMMMMMMMMMMMn

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2385103a26e7c343f33958af079faab59d8083857f0c4e65d0b851007beffc1.exe
    "C:\Users\Admin\AppData\Local\Temp\c2385103a26e7c343f33958af079faab59d8083857f0c4e65d0b851007beffc1.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2036

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\{E4DCC866-A564-4713-85BD-1D3730139194}.dll

          Filesize

          120KB

          MD5

          c9f333d1ff898672a34805f94a265329

          SHA1

          2deaac66698fb2e9b3868d23034c3211c508b739

          SHA256

          07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

          SHA512

          048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

        • memory/2036-54-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/2036-55-0x0000000075521000-0x0000000075523000-memory.dmp

          Filesize

          8KB

        • memory/2036-56-0x0000000001E80000-0x0000000001F66000-memory.dmp

          Filesize

          920KB

        • memory/2036-57-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/2036-60-0x0000000003A10000-0x0000000003A6B000-memory.dmp

          Filesize

          364KB

        • memory/2036-64-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB