Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe
Resource
win10v2004-20220901-en
General
-
Target
419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe
-
Size
100KB
-
MD5
45f366ca8b7ef2826b07d22bc14f0090
-
SHA1
08b6b7c2e7623e815e5d84b3c5eb172793f4663f
-
SHA256
419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932
-
SHA512
5f28acf92e52ad8bb81ef63ee66435cc4ed859122994e5a7b6a5fc61f5d6989536d3f284b4f625e3da54bdbf2ffb4c20e0cff0071fdd3e4679befa2b29e43184
-
SSDEEP
1536:Y/TRnqsoLb7u5IhGm0sruYTspLbAkoppq/IUxliHdm:WTRVoL3u52Gm0quhdippef
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000000072d-132.dat acprotect -
resource yara_rule behavioral2/files/0x000300000000072d-132.dat upx behavioral2/memory/4752-133-0x0000000010000000-0x000000001002E000-memory.dmp upx behavioral2/memory/4752-135-0x0000000010000000-0x000000001002E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe File created \??\c:\program files\common files\system\symsrv.dll.000 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4752 419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe"C:\Users\Admin\AppData\Local\Temp\419782520a94211bf97a7c71300a8c0db63a12f16abf23d566b38276d8853932.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5866a64ede2ff589f2c06127afb1a46a9
SHA1b1571f1029c8d07cfa0032fc3db742e60ebd9e54
SHA256dc6e293c583ba5e2864a2d312f3f8de9dfc4b503216821db1db4e2929a8f25d5
SHA512c9316dbe29f9d2180b3bf9ecb0d0711dc7fb443c4947fe6362ddef02d62f8143bdea2855a34d05e6a473d4d2e05cd40d5d4c10491a444d3c34ff21bf6b7dc4af