Analysis

  • max time kernel
    82s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 15:54

General

  • Target

    d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe

  • Size

    996KB

  • MD5

    3a02eafd977ddf9e672c9cf40ebf96eb

  • SHA1

    07450159d56c5f7580056b405df097faf9421f20

  • SHA256

    d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0

  • SHA512

    d46f3fe7cb32cb61ddcac4f3ab4e5ccabd34f4be2231edebf594ad2c3c09ef6e302a46787204ffaf9b97f89060fef0cf7317aea3de9e987c31426250a83c55b6

  • SSDEEP

    12288:rocklb1VDO4akMrVPuahtA1UI3s7ABKDJ2UtwGfbQtdTft7Cwv35CI5:8buOMhPztS3stDLwddJCO315

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Blocks application from running via registry modification 7 IoCs

    Adds application to list of disallowed applications.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe
    "C:\Users\Admin\AppData\Local\Temp\d2f8be759d15045adfdbc545d8272e4d9b07bb6878cb12492c1b2e03a07c79f0.exe"
    1⤵
    • Blocks application from running via registry modification
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Admin\F43F.dll

    Filesize

    89KB

    MD5

    205e3693cb24b95018eaee62af86ae03

    SHA1

    038749709bb472031c000557e57857222619dcd5

    SHA256

    4954323e4532552e5b3691986d579fdce8ebe60b6ec1eb049658103e05c9d52d

    SHA512

    4115d76eb964e8c84810ca1cb7758c74ef80d99168f38fb9ce036cea58f69b6579eabc16527b529a7f390f220d71952cbbcda84d20a05ef881714cf2c9a645cf

  • \Users\Admin\AppData\Roaming\Admin\F48E.dll

    Filesize

    308KB

    MD5

    6f25287bde8924d3a389645bc35c9995

    SHA1

    b5715f2ceaa63f148708e0e76c4708be04ebab17

    SHA256

    dcb3e6c97f65e194688892fd2ade5a8f1c2b40e829b7d7a2a24523007adc71f4

    SHA512

    7f4db950130f6c3da06e03ad63042ef46919497c153ee87ac4e3a73e8f569b87f06087e3ee4e5c8e4771d8a0b1036832b25f5b7b8b5045c6b58ebeffb84dc0ce

  • memory/948-54-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB

  • memory/948-55-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/948-60-0x0000000002390000-0x0000000002430000-memory.dmp

    Filesize

    640KB

  • memory/948-62-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/948-63-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/948-64-0x0000000002390000-0x0000000002430000-memory.dmp

    Filesize

    640KB

  • memory/948-65-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/948-66-0x0000000002390000-0x0000000002430000-memory.dmp

    Filesize

    640KB