Analysis

  • max time kernel
    99s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 11:24

General

  • Target

    d84b1418b2bc91f672d3a61d999ec5dbce4cd0da245a8afff3a00c0d9d5f222d.exe

  • Size

    1.8MB

  • MD5

    f461f9f52fc6a8c85090ff006f0afacb

  • SHA1

    7be1b241ae8734309ed19579a5689914357495a7

  • SHA256

    d84b1418b2bc91f672d3a61d999ec5dbce4cd0da245a8afff3a00c0d9d5f222d

  • SHA512

    b164d6a93026bfa29601296438854506c3a84ff28cb0edcd059f7fb08918f6d4e5591610b01a0daf6c19648e55de8ab9383d30db6d13db404e51e453bbd10487

  • SSDEEP

    49152:bWwGMAEA6TCdnbMY2KoH1C6OSJJQec8a9z:KwGMAQUbuV9OcJQeJa9z

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d84b1418b2bc91f672d3a61d999ec5dbce4cd0da245a8afff3a00c0d9d5f222d.exe
    "C:\Users\Admin\AppData\Local\Temp\d84b1418b2bc91f672d3a61d999ec5dbce4cd0da245a8afff3a00c0d9d5f222d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C schtasks /Create /F /TN "Searchlinenc" /SC ONLOGON /TR "'C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe' schcmd" /rL HIGHEST
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Create /F /TN "Searchlinenc" /SC ONLOGON /TR "'C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe' schcmd" /rL HIGHEST
        3⤵
        • Creates scheduled task(s)
        PID:524
    • C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe
      "C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe" Updatecmd
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\SysWOW64\sc.exe
        sc query npf
        3⤵
        • Launches sc.exe
        PID:1452
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c \DelUS.bat
      2⤵
      • Deletes itself
      PID:2004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DelUS.bat

    Filesize

    264B

    MD5

    fd592bba4d7a0a8f1d3349d4af11160e

    SHA1

    9ff4b08f07277ffdb9337a274f97eeb4e15e6ddd

    SHA256

    4f22a87fecf5d63ac53a238b51f44d93080f4e45e76cb2b49465c221dc5eab88

    SHA512

    9d63d9c64e5ff192d5c4adda5c38ae61b21d767646f74a7ad7a2849ca3d3a7b5d33d55873380e6019e9f1dd58fb3c9ea1ac5255a5c95ce28aa18c5376cef5410

  • C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • C:\Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Program Files (x86)\Searchline_nc\searchline_nc.dll

    Filesize

    170KB

    MD5

    810db6bbf806f2f32c7d8b0d390553e7

    SHA1

    4c751ed2227a1dad08114bd9ca81da25850f4777

    SHA256

    b5520eb399f3eb90d77cd1a4ddc4b4410d93a1f51d022e3e6c711c66525b9270

    SHA512

    b255bc829a4a1da9493259cdbc00426c89f996476138eae44b79e44a95a81b9f0b8446cc32ecd6f1b1528a3ee648658cd5a346abd48a60a02268c6d931ce0fa6

  • \Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Program Files (x86)\Searchline_nc\searchlineu_nc.exe

    Filesize

    390KB

    MD5

    78ddc299c6a243f684b1eece06685c26

    SHA1

    4a29b6651de3a70cec097d587439b5908dc2a88f

    SHA256

    18787c31e73ff28a4c6b33555f09bc72fee9de85a96530483bf61311c2c292a7

    SHA512

    78a8d188b345d85d367c04008a4841fd622fff3e3818a1c4d240c1d682454de47cc3db2f9df840fe3cd2db87a11accaa78361ab80f4f50583cf672c866d2f8f9

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\DLLWebCount.dll

    Filesize

    32KB

    MD5

    248536afcb6f59c1797f079a0da15b63

    SHA1

    7fa238f871b357c66168728ab1bb38addcfba3f8

    SHA256

    9c5f4eeadc9c2881bc02b45d757b35d3bfd2dc7d917d2e8fde2917fabf48908f

    SHA512

    b82accc8530650ebae8d4f8752002c2d23ab7b29e958e6c14731ad186a0fcdbbab937723a540de62d58f4659580843191fd53cb415e07167d7b55cd174a79652

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\SelfDelete.dll

    Filesize

    24KB

    MD5

    ddc0d6806073a5b034104c88288ca762

    SHA1

    9663cc10c496f05d6167e19c3920245040e5e431

    SHA256

    2f4767da9dc7e720d910d32d451674cd08b7892ca753ec5c10b11fe85e12f06b

    SHA512

    545ca797a397cfcbd9b5d3bd2da2e3219ba7a294e541831655c5763a7f17480fd0b990d0c2e58ba8c71f81d85472b2da6d079b8211b44c40c8c36d21168ec054

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\UnProtectMode.dll

    Filesize

    300KB

    MD5

    d89ff06d097d5040c1e530990bbe5dfe

    SHA1

    aaf0e28701d20617352b4679c32b93668e44cb00

    SHA256

    19daf98b87df2d643e4b42dfbb0f31dccbd9bd36908f419de7df7db3b74b8b4f

    SHA512

    512c82a00d41aa2884e4154dbbaefec557d4bf57c3848b7d25096791b393c9eae73d530aa476f1fd51409f4454e2668a1392810d3609f37c1b65ad7df485498d

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\version.dll

    Filesize

    22KB

    MD5

    fbe588b15eb1bd86defade69f796b56f

    SHA1

    2f63cf44039addddb22c2c0497673b49e6b3ad7a

    SHA256

    31144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f

    SHA512

    e1a9e29e4c62e77a2ec2c539344f0b5a8cd67ca3fd8dfefb0b0666a992eb2fabadb0034d439c4adbbdffd9c9439f23ee5757fac0ed669d3c9db48f50c677143d

  • \Users\Admin\AppData\Local\Temp\nsy9ABC.tmp\version.dll

    Filesize

    22KB

    MD5

    fbe588b15eb1bd86defade69f796b56f

    SHA1

    2f63cf44039addddb22c2c0497673b49e6b3ad7a

    SHA256

    31144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f

    SHA512

    e1a9e29e4c62e77a2ec2c539344f0b5a8cd67ca3fd8dfefb0b0666a992eb2fabadb0034d439c4adbbdffd9c9439f23ee5757fac0ed669d3c9db48f50c677143d

  • memory/364-64-0x0000000000000000-mapping.dmp

  • memory/524-66-0x0000000000000000-mapping.dmp

  • memory/1452-81-0x0000000000000000-mapping.dmp

  • memory/1748-70-0x0000000000600000-0x0000000000612000-memory.dmp

    Filesize

    72KB

  • memory/1748-69-0x0000000000600000-0x0000000000612000-memory.dmp

    Filesize

    72KB

  • memory/1748-68-0x0000000000600000-0x0000000000612000-memory.dmp

    Filesize

    72KB

  • memory/1748-54-0x0000000075631000-0x0000000075633000-memory.dmp

    Filesize

    8KB

  • memory/1836-73-0x0000000000000000-mapping.dmp

  • memory/2004-84-0x0000000000000000-mapping.dmp