Analysis
-
max time kernel
82s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe
Resource
win7-20220901-en
General
-
Target
d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe
-
Size
996KB
-
MD5
3a02eafd977ddf9e672c9cf40ebf96eb
-
SHA1
07450159d56c5f7580056b405df097faf9421f20
-
SHA256
d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0
-
SHA512
d46f3fe7cb32cb61ddcac4f3ab4e5ccabd34f4be2231edebf594ad2c3c09ef6e302a46787204ffaf9b97f89060fef0cf7317aea3de9e987c31426250a83c55b6
-
SSDEEP
12288:rocklb1VDO4akMrVPuahtA1UI3s7ABKDJ2UtwGfbQtdTft7Cwv35CI5:8buOMhPztS3stDLwddJCO315
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c0000000122da-58.dat acprotect -
Blocks application from running via registry modification 7 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\tmhelp = "tmhelp.exe" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\pcsc = "pcsc.exe" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\ipcsc = "ipcsc.exe" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\hspcsc = "hspcsc.exe" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\nvsvc16 = "nvsvc16.exe" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
resource yara_rule behavioral1/files/0x000c0000000122da-58.dat upx behavioral1/memory/948-63-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TypedURLs d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Key deleted \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe Key deleted \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe 948 d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe"C:\Users\Admin\AppData\Local\Temp\d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe"1⤵
- Blocks application from running via registry modification
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5205e3693cb24b95018eaee62af86ae03
SHA1038749709bb472031c000557e57857222619dcd5
SHA2564954323e4532552e5b3691986d579fdce8ebe60b6ec1eb049658103e05c9d52d
SHA5124115d76eb964e8c84810ca1cb7758c74ef80d99168f38fb9ce036cea58f69b6579eabc16527b529a7f390f220d71952cbbcda84d20a05ef881714cf2c9a645cf
-
Filesize
308KB
MD56f25287bde8924d3a389645bc35c9995
SHA1b5715f2ceaa63f148708e0e76c4708be04ebab17
SHA256dcb3e6c97f65e194688892fd2ade5a8f1c2b40e829b7d7a2a24523007adc71f4
SHA5127f4db950130f6c3da06e03ad63042ef46919497c153ee87ac4e3a73e8f569b87f06087e3ee4e5c8e4771d8a0b1036832b25f5b7b8b5045c6b58ebeffb84dc0ce