Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe
Resource
win10v2004-20220812-en
General
-
Target
5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe
-
Size
101KB
-
MD5
9c02e78c5efdbdc27109c260f8cb3a5e
-
SHA1
a1c298622ff713e9d70195f78e5635a02192e972
-
SHA256
5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962
-
SHA512
93582d5fb5a01bf8835a011cb5ec2a45ab0571bdf3d3387a2be216ac179dd8bd8ab4ce8a8c6c0321edcb31c6a4fe8b2b1d354b27b55d10f99571f7c4743b3d7b
-
SSDEEP
1536:124UHxpN/MUXsLTvCj0DBXJaOT+KfPQODLpHU2bTOTige4n8Nqoi/Q68mPhg7:84URpNUUX6z/DBXJfKmPQ+e2sir/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll acprotect behavioral1/memory/1364-75-0x00000000743B0000-0x00000000743B9000-memory.dmp acprotect -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx \Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dll upx behavioral1/memory/1364-75-0x00000000743B0000-0x00000000743B9000-memory.dmp upx -
Loads dropped DLL 17 IoCs
Processes:
5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exepid process 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe 1364 5e93ebccccc524ef3f797f87b1c9b326dc1be03ae9eae27b846bb964580b2962.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\InstallOptions.dllFilesize
14KB
MD534466cab38abcbc09ffac768d526f896
SHA12684f5f6c2b005cba812fc8cc1157777554fa3a3
SHA2568b4a1e7bf076c20240eb0a46cbdc8b835cfd89265fb78a3c1c5339ab820d2c1c
SHA5125c6ae996a81f0fd9d3efe4e61c8683eb833cb203a476772c06eadb48e10e34d05a8fc2c837cf663dcc3a37713bd86694c8eb251868aa5bb42c4b21ba8c8e8fc7
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\inetc.dllFilesize
20KB
MD5c498ae64b4971132bba676873978de1e
SHA192e4009cd776b6c8616d8bffade7668ef3cb3c27
SHA2565552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8
SHA5128e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
\Users\Admin\AppData\Local\Temp\nsj38DE.tmp\nsResize.dllFilesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de
-
memory/1364-74-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-72-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-73-0x00000000743B0000-0x00000000743B9000-memory.dmpFilesize
36KB
-
memory/1364-54-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/1364-75-0x00000000743B0000-0x00000000743B9000-memory.dmpFilesize
36KB
-
memory/1364-76-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-77-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-78-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-79-0x00000000743B0000-0x00000000743B9000-memory.dmpFilesize
36KB
-
memory/1364-80-0x00000000743C0000-0x00000000743C9000-memory.dmpFilesize
36KB
-
memory/1364-81-0x00000000743B0000-0x00000000743B9000-memory.dmpFilesize
36KB