Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe
Resource
win10v2004-20220812-en
General
-
Target
d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe
-
Size
450KB
-
MD5
afb37333f3ee297a9cabad051f344adc
-
SHA1
a9882775c75e8d62299fc6e5732b0a95d95ba48a
-
SHA256
d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1
-
SHA512
caedd42f11b7f425d2abd62dea5247a70bedf348dc17dd3f8d32ec92c7b8ca525ebf2d1a20ce8538c0690e064d01e80185be289603fc7a9cf4a3fcb148c41da5
-
SSDEEP
6144:RO9pVI6FOpWQfgTYL4HZUzkgGGP6ZOV221T+d0Sz98ijEPO:R+VIcOpWDSc5gX6z2xSGIEPO
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000200000001e706-140.dat acprotect behavioral2/files/0x000200000001e706-139.dat acprotect -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 620 unzip.exe 260 test.exe -
resource yara_rule behavioral2/files/0x000200000001e706-140.dat upx behavioral2/files/0x000200000001e706-139.dat upx behavioral2/memory/260-146-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/260-148-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe -
Loads dropped DLL 1 IoCs
pid Process 260 test.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: test.exe File opened (read-only) \??\L: test.exe File opened (read-only) \??\P: test.exe File opened (read-only) \??\S: test.exe File opened (read-only) \??\T: test.exe File opened (read-only) \??\F: test.exe File opened (read-only) \??\K: test.exe File opened (read-only) \??\Q: test.exe File opened (read-only) \??\R: test.exe File opened (read-only) \??\Y: test.exe File opened (read-only) \??\B: test.exe File opened (read-only) \??\I: test.exe File opened (read-only) \??\N: test.exe File opened (read-only) \??\O: test.exe File opened (read-only) \??\U: test.exe File opened (read-only) \??\W: test.exe File opened (read-only) \??\X: test.exe File opened (read-only) \??\Z: test.exe File opened (read-only) \??\E: test.exe File opened (read-only) \??\H: test.exe File opened (read-only) \??\J: test.exe File opened (read-only) \??\M: test.exe File opened (read-only) \??\V: test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString test.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe 260 test.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 260 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3020 wrote to memory of 620 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 88 PID 3020 wrote to memory of 620 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 88 PID 3020 wrote to memory of 620 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 88 PID 3020 wrote to memory of 260 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 90 PID 3020 wrote to memory of 260 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 90 PID 3020 wrote to memory of 260 3020 d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe"C:\Users\Admin\AppData\Local\Temp\d433d9f3ef340c72f2a12b0c75b22eaca233f1fc9f75770020b966cc8d6a93d1.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Public\Documents\unzip.exe"C:\Users\Public\Documents\unzip.exe" -o 1.zip2⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Public\Documents\test.exe"C:\Users\Public\Documents\test.exe" -c2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD597eecc36f563e0d03b48ee31a38f021f
SHA1ed16c53d4276f0a4e1b6280f169e82c68b8f8ef3
SHA256b75879339cbebea035b93dcc073581ac355a4817fa7d3976217536734199eb10
SHA512ff00d6915e94d76db789226a7791d789a91603146b2a73b3907fdd179154e21d28dfc4163ad3eaca5865a231af7f9b7453920fda6d39012fcb1d71d0e2e5780b
-
Filesize
4.3MB
MD51a71ed1b4c58ec5a7ab7ecb51dcea03b
SHA17484b3f8d946ecfe7e3d1ad078d334139d59d2a9
SHA2568e8a6892f7899f77b05bf11eda3220955b45bed3be9c329638d31c2417b11ee8
SHA512b7cd5392d654b42163a215dcefacf5268878eec2e4bab6bb36a09e74e9b61a949cb4f01f93e19d3227efc3562f7aae788208d6f14bddcf9bb077c3d01fb214de
-
Filesize
33KB
MD50ffed48741daae9a3a64461c124f1d69
SHA18d62172fb70356b8d61e8df5cb7ffcbae5616929
SHA25602d0aab511ecc7311840493dc4592d3e6a7aaf735d9ca2a0e788b8ae99f3a79c
SHA5124e6442fa341804d9a435ef8eddd82ae3b11c622fa5e181abebbeb7cab324a91ced9449614ba78ad34878fd29fdd123f356dceeff3905a3fb57a31c7ef6889040
-
Filesize
33KB
MD50ffed48741daae9a3a64461c124f1d69
SHA18d62172fb70356b8d61e8df5cb7ffcbae5616929
SHA25602d0aab511ecc7311840493dc4592d3e6a7aaf735d9ca2a0e788b8ae99f3a79c
SHA5124e6442fa341804d9a435ef8eddd82ae3b11c622fa5e181abebbeb7cab324a91ced9449614ba78ad34878fd29fdd123f356dceeff3905a3fb57a31c7ef6889040
-
Filesize
72KB
MD514a95532d6b663fe84e02fe659474416
SHA14ce8e2acb914b4e29695cc13b8f1bac21c7f5604
SHA2561ad1f3dbb12a574e0f93c4f62371f4bcf028f52f38bc5871ca3cb25a970c5416
SHA51250ec5fc73f5f252c5cc6ad46ae52f89b7c9c7b3386474eac0e65354dcfef6a5bbef8020db73290ac5696273c592dd9e007a11981463659e26c7a4d08a3069133
-
Filesize
72KB
MD514a95532d6b663fe84e02fe659474416
SHA14ce8e2acb914b4e29695cc13b8f1bac21c7f5604
SHA2561ad1f3dbb12a574e0f93c4f62371f4bcf028f52f38bc5871ca3cb25a970c5416
SHA51250ec5fc73f5f252c5cc6ad46ae52f89b7c9c7b3386474eac0e65354dcfef6a5bbef8020db73290ac5696273c592dd9e007a11981463659e26c7a4d08a3069133
-
Filesize
340KB
MD5dc40dd3b36c9a8574f19fd4896a82e93
SHA1a5c0666afb7edde5b9139c581e9660362613297f
SHA256af29416261626e56643c167458d9ddcb720601ac1a74c996be35acb6ebd4efe6
SHA5125fc83211afa507d11608a765c75d4e516f912c48c85648b647eaf35da3ccb2dd93bc5f7a2b297558fe19310873a947203a741a76d8e8b1bcbe2ff4eb7d2617ce
-
Filesize
340KB
MD5dc40dd3b36c9a8574f19fd4896a82e93
SHA1a5c0666afb7edde5b9139c581e9660362613297f
SHA256af29416261626e56643c167458d9ddcb720601ac1a74c996be35acb6ebd4efe6
SHA5125fc83211afa507d11608a765c75d4e516f912c48c85648b647eaf35da3ccb2dd93bc5f7a2b297558fe19310873a947203a741a76d8e8b1bcbe2ff4eb7d2617ce