Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe
Resource
win10v2004-20220812-en
General
-
Target
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe
-
Size
2.5MB
-
MD5
2946651ea2936f0fee59637aa898acc2
-
SHA1
04585778feff6d3d1c8cd78d47e04bc153243149
-
SHA256
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff
-
SHA512
9ac50de52150bf936d7cbc2b13c5d224da186977360be5bf9493a456c41ffde725bd2da3be0330592156aa0d82ed53d73deb74a1586557506148f459cfdb9d31
-
SSDEEP
49152:SJ5UWm5RCkNdkSJ9h0u9FDsS/7wnX7m5QfJmO1ytYp:SJAfCkNdpUnRm5QBmW5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\fgk3E39.tmp acprotect C:\Users\Admin\AppData\Local\Temp\fgk3E39.tmp acprotect \Users\Admin\AppData\Local\Temp\fgk3E39.tmp acprotect \Users\Admin\AppData\Local\Temp\fgk3E39.tmp acprotect -
Executes dropped EXE 1 IoCs
Processes:
_INS5176._MPpid process 2044 _INS5176._MP -
Loads dropped DLL 9 IoCs
Processes:
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exesetup.exe_ISDEL.EXE_INS5176._MPpid process 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe 940 setup.exe 940 setup.exe 940 setup.exe 1924 _ISDEL.EXE 2044 _INS5176._MP 2044 _INS5176._MP 2044 _INS5176._MP 2044 _INS5176._MP -
Drops file in Windows directory 5 IoCs
Processes:
_ISDEL.EXE_INS5176._MPsetup.exedescription ioc process File created C:\Windows\_INS33IS._MP _ISDEL.EXE File opened for modification C:\Windows\IsUninst.exe _INS5176._MP File opened for modification C:\Windows\_iserr31.ini setup.exe File created C:\Windows\_isenv31.ini setup.exe File opened for modification C:\Windows\_delis32.ini setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exepid process 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exesetup.exedescription pid process target process PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 856 wrote to memory of 940 856 88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe setup.exe PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 2044 940 setup.exe _INS5176._MP PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE PID 940 wrote to memory of 1924 940 setup.exe _ISDEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe"C:\Users\Admin\AppData\Local\Temp\88a619f4adb45dcc99d97e52401e7b71bcf8774e1d6c0056722054f12c7519ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\InstallShield\setup.exeSETUP.EXE -isw64"C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\SETUP.EXE"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPC:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MP3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\SysWOW64\InstallShield\_ISDEL.EXEC:\Windows\SysWOW64\InstallShield\_ISDEL.EXE3⤵
- Loads dropped DLL
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\LAYOUT.BINFilesize
334B
MD56eb96dca292c34b6b7fa77e796fb090f
SHA196339b054a63d9b6f674a5dc928859a144b1dfce
SHA2566829349d72831a00e8a65f60ba3bf2db50620cc1567970b675cbf6fa5f76680e
SHA512e946be27fb05a5a3c3ff4b8f9a162a71156a099649ba84aeb80fa9fb2abbbddd49a72b4a6db855e909c71acc71a9c4b1ff007e176cf199b3e703e637e94782b2
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\SETUP.LIDFilesize
49B
MD51b79748e93a541cc1590505b6c72828a
SHA11ddefee04dc9e9b2576dc34eebcfa3de4aa82af9
SHA256708d29c649525882937031b3d73cc851b7b1bc30772eb4e0e2a71523908f2eb5
SHA512e85c1f04d3841cd1e5aa5d7ba37bb3aff557d67b1aceb2d9435f07862593eb4e139162c71d9b017c82aade2e1c535c79d1a18d26dffb95282e10bc64bda04bfc
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\_INST32I.EX_Filesize
293KB
MD58d70c8885459ccfb5b8066c39e969699
SHA1bab7718c41427419065bffa5d1af298cac77961e
SHA256c707f6bd6eea954ddf0e8999ed949a506f915e4ae8237fbe52b3d548e68867b4
SHA51235868601d26a5f77c718ec9b46365e4e09f9464b63a98175526994bb175f6e201cc52403f807395ae564a66c40e6cce50312113e5da2c81c58540e4dd7467d2f
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\_sys1.cabFilesize
181KB
MD5e2cb1c24fd9fcbd1025732809ed017b7
SHA1b3c2dd9ddd18532f84c2a5960cad4b211f024870
SHA256fa828b57091a5e12c21a76ba151d7e946df3f4e41b5bf5c0df6312f2e18c9f18
SHA51295965645b7aa90ce4bdf81ea7e129a09ead1f73f90be82b59868368f582113302f3df364eec09fa9921d86e3209a75bad4a89086cdfb74438cb1f4197688b579
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\_user1.cabFilesize
44KB
MD5c7dd40f7dd860b744c17745afe0e5507
SHA1b0d2555e9e5f98b655761c3a5b49b2ee64aae352
SHA2568e48caa457f1177c374264b6d2de4bbaef27d74ad23743cee05e7e359d42c995
SHA512af5b5649e83e6914b26cea00768e6e9708c83169f3ea1e7776a563384862f3c17d7faa97b1bcb7f163823fd005d0916b9b6eda1d533c9c4920ae65f7c6b641a1
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\data1.cabFilesize
1.8MB
MD50a184ffe2340d6a1341cb903c2d620cc
SHA128f064fa6fcb602f5c0ac7a4540426ea623a0225
SHA2563165e5331afdb3c7048af75562c92583cb7998889050f6d715b773be40519b34
SHA51200a4ef349aa7660100645dd56f2130986ac3700df8ea36ad4fc5b673c236aa6cf4c8cc0c9936f4dc7354e468c5fdbc6998468d47a610316d88c45f57efb3cbc0
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\os.datFilesize
417B
MD5af1d8d9435cb10fe2f4b4215eaf6bec4
SHA1c20e693a53acc586c59a456648df5162f172c27d
SHA2562f148cb3d32ab70a315b5a853761c2702b6deef6ffaff6aa76d513b945ce7ef7
SHA51264f572a0d4df3c35a302cb232400dbd1165016ec93fb45ac2c539090d4018527b6d2f335fbcb57571d327dadb66e7e062a692ff86b2f0215967cfd0a8927355c
-
C:\Users\Admin\AppData\Local\Temp\WZSE1.tmp\setup.iniFilesize
66B
MD5aa74f30530ef4099e10ea1ac1f1f63b1
SHA1b8119c839cf2e3a889c43b7f32d2e294a7c1d918
SHA2569d9c8618a04ee30c2f229b8293a2e39f9fcc7c509492ce81380013ec2ba7879f
SHA51296a88c5b541da2179ccd15a57a90e1c0319660e75bf89eb64193776c9313923c21ee5c35022ec382e8f34b1d31ed32f143c25231a294e26ce6d79c6f94be843b
-
C:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\ZDATAI51.DLLFilesize
52KB
MD5805006328d0da72df964909bba8166ac
SHA179814934c81d044b1bbfdc44f689fc68038aaa26
SHA25612ff2d1288a0684fe8162ba8a76662288b7e3be9e77725de93d05525a43a1986
SHA5128fdb2a45442ef0a2f1cca6b50485391d744b061f58faf43391aaec60811abfd45922b5368ec68ec1dce125e3ac2f71f0bc0077def13622479c92983183dc6765
-
C:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS0432.INIFilesize
175B
MD5ba9b460ae169a73b744b77c0289e7d65
SHA1bff83439a7a48c560f973fc276bacad864b4549c
SHA256b5d61c11ab6038f6b90969a670bf3d00bf97ee1f3403db722a930cc59f5828e9
SHA512ceb987052bf363da391dcb2659e04dcb6cf25e97783f23ddb2e816d9ce6dd0df3107483839368f8fbcba0fb2a306689abdcfc947406a41ce7a9d8000ea9f2275
-
C:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPFilesize
581KB
MD5fc70a99b13f272737b003d0b6846a189
SHA1513d2471b9960828b8890b637bc333e9b1d7187d
SHA25682ca5fd2d52ddbef610dccb4641fab4e84f8e55d81f1d92ec34a41b54beb0664
SHA512d0366dd73a0056a4f53b35ce6784cb4735b51794a4acba9999c2c9cba83dd6c8aba3a19e39cb690f5e41045f139ac1f73c910addd1f539d0b62f9129ac30a9d0
-
C:\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPFilesize
581KB
MD5fc70a99b13f272737b003d0b6846a189
SHA1513d2471b9960828b8890b637bc333e9b1d7187d
SHA25682ca5fd2d52ddbef610dccb4641fab4e84f8e55d81f1d92ec34a41b54beb0664
SHA512d0366dd73a0056a4f53b35ce6784cb4735b51794a4acba9999c2c9cba83dd6c8aba3a19e39cb690f5e41045f139ac1f73c910addd1f539d0b62f9129ac30a9d0
-
C:\Users\Admin\AppData\Local\Temp\fgk3E39.tmpFilesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
C:\Windows\_delis32.iniFilesize
268B
MD5431536b7b894cbeaab41384492bf3b45
SHA1c265c4a3f434eb1ccabc8d08eaad5ab8ecfeab9e
SHA256c0b4fc8cff3a8e29b03c28eb7f81eec5442514d7dd4e8bafe9840c6cea985aa9
SHA512714185664b08401aa1388f29d469480b3b19d8ac8b72e96bbc641016a0e464f70cea03b495750a7b1d53284905e19c73e15197587804041476be7c49e4c6ec01
-
C:\Windows\_isenv31.iniFilesize
1KB
MD5b732c0b2ece3315877ff857dd9804f94
SHA17aafcc9d49db7f8093b2e7c677f8a33332bfdedb
SHA2566894731c052aecb8cb87f8fd15fe71b9b51ee5ea0c913850b66e3472dbd519bb
SHA51222a4125f217e956706221c5a83778b96ae347a8edaea07ca7edd8c99e1617179eee502886afd2df55a5558b70a3c8f6f4ed96a563a033d42ee0cca337d901485
-
C:\Windows\_iserr31.iniFilesize
521B
MD5b99921c1ce27e631044ad7ad03e27faa
SHA113fa80578e7a9f5ece1cfd7913eec6e3e5b12250
SHA256bd6efc8e0f5b775ae357f3b647d74b7ddbc5fb8fc827e659d77ac2ef9888f16f
SHA51279ff7699ad240f4b62c5b336fb6ebb684e675b2d74cf541997f1d42716c1e05bcc35d92443c0641a6f0e60a26d3add03f6316390aacb22701b718f652e5472ab
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\ZDataI51.dllFilesize
52KB
MD5805006328d0da72df964909bba8166ac
SHA179814934c81d044b1bbfdc44f689fc68038aaa26
SHA25612ff2d1288a0684fe8162ba8a76662288b7e3be9e77725de93d05525a43a1986
SHA5128fdb2a45442ef0a2f1cca6b50485391d744b061f58faf43391aaec60811abfd45922b5368ec68ec1dce125e3ac2f71f0bc0077def13622479c92983183dc6765
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\ZDataI51.dllFilesize
52KB
MD5805006328d0da72df964909bba8166ac
SHA179814934c81d044b1bbfdc44f689fc68038aaa26
SHA25612ff2d1288a0684fe8162ba8a76662288b7e3be9e77725de93d05525a43a1986
SHA5128fdb2a45442ef0a2f1cca6b50485391d744b061f58faf43391aaec60811abfd45922b5368ec68ec1dce125e3ac2f71f0bc0077def13622479c92983183dc6765
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPFilesize
581KB
MD5fc70a99b13f272737b003d0b6846a189
SHA1513d2471b9960828b8890b637bc333e9b1d7187d
SHA25682ca5fd2d52ddbef610dccb4641fab4e84f8e55d81f1d92ec34a41b54beb0664
SHA512d0366dd73a0056a4f53b35ce6784cb4735b51794a4acba9999c2c9cba83dd6c8aba3a19e39cb690f5e41045f139ac1f73c910addd1f539d0b62f9129ac30a9d0
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_ISTMP0.DIR\6deb69.DLLFilesize
126KB
MD54dbf53786ecdd42cde6a88115b36e0f6
SHA1dc2fda1c89d2b90f9e528e36f7e6965d946e2b1c
SHA256b6a5e5d3e991d5e5f6ede9eca927fde2e582b88d973e1974171f132abbdec6b5
SHA512591cd570912b1a6d1f779ba495807b50adc9c1432e39554bcebab78d71a418d15d8e12c0203b1f84e02de51ad63a2d3e9cdb7c85ba9d124c6642d5e338d992b6
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_ISTMP0.DIR\IsUninst.ExeFilesize
296KB
MD5c0dffad445b264da258f9794633d6455
SHA158b480dce3283c115eea4756c3864da968ff06a8
SHA2569ad358395fe14631c451e67b9f03a213458b84c7a411ed8dcc0bd58d2fb9c58b
SHA5128821a2e18559d1f6e4dd2de6288f48a456747ecc4ed71e5c49795a3da58cc021316c0b07d5a3a508e341c1921de7a1bb90fdb879bc4d55f16ffb0786540d700d
-
\Users\Admin\AppData\Local\Temp\_ISTMP1.DIR\_ISTMP0.DIR\IsUninst.ExeFilesize
296KB
MD5c0dffad445b264da258f9794633d6455
SHA158b480dce3283c115eea4756c3864da968ff06a8
SHA2569ad358395fe14631c451e67b9f03a213458b84c7a411ed8dcc0bd58d2fb9c58b
SHA5128821a2e18559d1f6e4dd2de6288f48a456747ecc4ed71e5c49795a3da58cc021316c0b07d5a3a508e341c1921de7a1bb90fdb879bc4d55f16ffb0786540d700d
-
\Users\Admin\AppData\Local\Temp\fgk3E39.tmpFilesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
\Users\Admin\AppData\Local\Temp\fgk3E39.tmpFilesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
\Users\Admin\AppData\Local\Temp\fgk3E39.tmpFilesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
memory/856-58-0x00000000008E0000-0x0000000000953000-memory.dmpFilesize
460KB
-
memory/856-56-0x0000000000020000-0x000000000002D000-memory.dmpFilesize
52KB
-
memory/856-55-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/856-59-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/856-54-0x0000000075D01000-0x0000000075D03000-memory.dmpFilesize
8KB
-
memory/940-68-0x0000000000420000-0x0000000000493000-memory.dmpFilesize
460KB
-
memory/940-60-0x0000000000000000-mapping.dmp
-
memory/1924-80-0x0000000000840000-0x00000000008B3000-memory.dmpFilesize
460KB
-
memory/1924-77-0x0000000000000000-mapping.dmp
-
memory/2044-72-0x0000000000000000-mapping.dmp