Analysis

  • max time kernel
    28s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 22:19

General

  • Target

    f96bb7aa07f3344f135fe269982fc921134994b319c895d788ac1b744658d096.exe

  • Size

    1.0MB

  • MD5

    7b61a85e0c90d55dd43ade8b52be16df

  • SHA1

    1a2d96925537e178d32dc148823f8513fe5045f6

  • SHA256

    f96bb7aa07f3344f135fe269982fc921134994b319c895d788ac1b744658d096

  • SHA512

    bc0a97bae758f5dea4391d69686c21d876e21f4239ab5c28663bb07ba34250d160078b86487ad6c9f345eec06746928774e5e520d42fccc3b8faa4aaaeb34a90

  • SSDEEP

    24576:8kabsM8KGH7Co0OLeGrIocE5lArjPP1+LEvhtlFM:8k08KGbNLeGMb4un1+wv37M

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f96bb7aa07f3344f135fe269982fc921134994b319c895d788ac1b744658d096.exe
    "C:\Users\Admin\AppData\Local\Temp\f96bb7aa07f3344f135fe269982fc921134994b319c895d788ac1b744658d096.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL

    Filesize

    90KB

    MD5

    0ac28de5e930e8a52ad6b163c5473412

    SHA1

    25371c9d876959cb58b50c25ad709cf98dde45bb

    SHA256

    06eed244d89f6e15205d5beb8085ac33c0de486dfe30eec9fb73b91de07e5f62

    SHA512

    c2c82449927cac953668142a3f597c06626b0b3a26e8036de34e4ca1042a572fa3befa799d43fb24a1d23c821b5ed7994e3d211b6aaced15ba31d4639e96d877

  • \Users\Admin\AppData\Local\Temp\dgk3F23.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • memory/2000-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB

  • memory/2000-57-0x0000000000850000-0x000000000092B000-memory.dmp

    Filesize

    876KB

  • memory/2000-56-0x0000000001000000-0x00000000010DB000-memory.dmp

    Filesize

    876KB

  • memory/2000-58-0x0000000000270000-0x00000000002E3000-memory.dmp

    Filesize

    460KB

  • memory/2000-60-0x0000000001000000-0x00000000010DB000-memory.dmp

    Filesize

    876KB

  • memory/2000-61-0x0000000000270000-0x00000000002E3000-memory.dmp

    Filesize

    460KB