Analysis
-
max time kernel
191s -
max time network
233s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 00:41
Static task
static1
Behavioral task
behavioral1
Sample
02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe
Resource
win7-20220901-en
General
-
Target
02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe
-
Size
799KB
-
MD5
f6e4f26d585438382e37e71d12adb9a1
-
SHA1
af530444e3720a1ece38168d044980d4d182ef05
-
SHA256
02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc
-
SHA512
36dddbd5711c93ff52b2a5d452d6fa2d09a049ced5f9de54519342d602f34fa246bc38b473a1214150429594dcb8acc0b8d345d4e8526171c5bf5e8cd843b25f
-
SSDEEP
12288:J9wnJECgNgRFgxrfMQ2ZT4MJeRWDIUKHOWtiyk+zG8c/QVzOcsFm42JE5MoBOdJX:J9wLogReVsURRWmHOWt7hUc2mZqfEX1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00060000000231f5-157.dat acprotect behavioral2/files/0x00060000000231f5-156.dat acprotect -
Executes dropped EXE 3 IoCs
pid Process 3644 aa4119a293e7257ed5298edb5de64877.exe 1956 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe -
resource yara_rule behavioral2/files/0x00060000000231f5-157.dat upx behavioral2/files/0x00060000000231f5-156.dat upx behavioral2/memory/4916-159-0x00000000032D0000-0x00000000032DC000-memory.dmp upx behavioral2/memory/4916-162-0x00000000032D0000-0x00000000032DC000-memory.dmp upx -
Loads dropped DLL 17 IoCs
pid Process 3644 aa4119a293e7257ed5298edb5de64877.exe 1956 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe 4916 aa4119a293e7257ed5298edb5de64877.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aa4119a293e7257ed5298edb5de64877.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023189-134.dat nsis_installer_2 behavioral2/files/0x0008000000023189-133.dat nsis_installer_2 behavioral2/files/0x0008000000023189-137.dat nsis_installer_2 behavioral2/files/0x0008000000023189-140.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 220 wrote to memory of 3644 220 02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe 81 PID 220 wrote to memory of 3644 220 02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe 81 PID 220 wrote to memory of 3644 220 02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe 81 PID 3644 wrote to memory of 1956 3644 aa4119a293e7257ed5298edb5de64877.exe 82 PID 3644 wrote to memory of 1956 3644 aa4119a293e7257ed5298edb5de64877.exe 82 PID 3644 wrote to memory of 1956 3644 aa4119a293e7257ed5298edb5de64877.exe 82 PID 1956 wrote to memory of 4916 1956 aa4119a293e7257ed5298edb5de64877.exe 83 PID 1956 wrote to memory of 4916 1956 aa4119a293e7257ed5298edb5de64877.exe 83 PID 1956 wrote to memory of 4916 1956 aa4119a293e7257ed5298edb5de64877.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe"C:\Users\Admin\AppData\Local\Temp\02478575bd1e7dadef1bcde50a9b2d640fa768bca8167ca97361f72d08875ecc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exeC:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exeC:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exeC:\Users\Admin\AppData\Local\Temp\aa4119a293e7257ed5298edb5de64877.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4916
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD595856066e32d4f493dff31c8027e8404
SHA1b49e48548c73c39809ab4f05307a22301619fd28
SHA256d5c850c039a9b9452f07a3d4037dd5442db9b215146fd000b7e756c3842e83ac
SHA51284939c27fe5838874cec9ac6c91fda332e6a12ce682f2861531a504de01ed2aa7fac4e0903c5afbcf8b04ea923eb3c9a2d58c290ffc789ac122f9e0ea0423c85
-
Filesize
877KB
MD595856066e32d4f493dff31c8027e8404
SHA1b49e48548c73c39809ab4f05307a22301619fd28
SHA256d5c850c039a9b9452f07a3d4037dd5442db9b215146fd000b7e756c3842e83ac
SHA51284939c27fe5838874cec9ac6c91fda332e6a12ce682f2861531a504de01ed2aa7fac4e0903c5afbcf8b04ea923eb3c9a2d58c290ffc789ac122f9e0ea0423c85
-
Filesize
877KB
MD595856066e32d4f493dff31c8027e8404
SHA1b49e48548c73c39809ab4f05307a22301619fd28
SHA256d5c850c039a9b9452f07a3d4037dd5442db9b215146fd000b7e756c3842e83ac
SHA51284939c27fe5838874cec9ac6c91fda332e6a12ce682f2861531a504de01ed2aa7fac4e0903c5afbcf8b04ea923eb3c9a2d58c290ffc789ac122f9e0ea0423c85
-
Filesize
877KB
MD595856066e32d4f493dff31c8027e8404
SHA1b49e48548c73c39809ab4f05307a22301619fd28
SHA256d5c850c039a9b9452f07a3d4037dd5442db9b215146fd000b7e756c3842e83ac
SHA51284939c27fe5838874cec9ac6c91fda332e6a12ce682f2861531a504de01ed2aa7fac4e0903c5afbcf8b04ea923eb3c9a2d58c290ffc789ac122f9e0ea0423c85
-
Filesize
25KB
MD50f26c6d34d3841e93145dd00d0175651
SHA157b068569d0eb2336503beed87589629ab2a6f1f
SHA2560cc5dc45b6a04ec236f4ecf0eeee212096b1561179d71c49dd5fc82aba706741
SHA51272785e520d78a4ebd8779e5497806406c1b91b9c05ed82a392a6af689781e26c77f0032c66540b80e2e7e457128df2afd0647b0dbc970a11d0cd4ee3930d47a5
-
Filesize
62KB
MD5a990de9edf0145ca5b01761978f49432
SHA11415f5d123dcc03f286548607bb8238826cae858
SHA256338187c9d996921e45efbbc6d558f75d2eed32fb73cfd2a14189ec039091fc65
SHA51232541e89523dfbbb891a215c1e7261d83a79db5ac3cea711c48f7525e98988955716a86a2ecd0264f04a36c8c8f031af57bd7a16496b3b2fcce055d1264d22de
-
Filesize
52KB
MD54a4845ba1666907f708c9c10a31ec227
SHA11ebf626adc84147e5114885ce779f92d6eb68f3a
SHA256a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d
SHA512d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464
-
Filesize
52KB
MD54a4845ba1666907f708c9c10a31ec227
SHA11ebf626adc84147e5114885ce779f92d6eb68f3a
SHA256a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d
SHA512d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464
-
Filesize
80KB
MD54bf7db111acfa7c28ad36606107b3322
SHA16f20b9f6663ce0c309a2ce60e718d64ffb6c75b3
SHA256bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0
SHA5120a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6
-
Filesize
80KB
MD54bf7db111acfa7c28ad36606107b3322
SHA16f20b9f6663ce0c309a2ce60e718d64ffb6c75b3
SHA256bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0
SHA5120a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6
-
Filesize
11KB
MD57292b642bd958aeb7fd7cfd19e45b068
SHA119a800620d041634abae5b5d096cb0e87ce4c188
SHA25690f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09
SHA512bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a
-
Filesize
11KB
MD57292b642bd958aeb7fd7cfd19e45b068
SHA119a800620d041634abae5b5d096cb0e87ce4c188
SHA25690f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09
SHA512bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a
-
Filesize
10KB
MD57e3c808299aa2c405dffa864471ddb7f
SHA1b5de7804dd35ed7afd0c3b59d866f1a0749495e0
SHA25691c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd
SHA512599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738
-
Filesize
4KB
MD5d02a497be5f89c44827f142c4662f591
SHA138f83ccbac11de069df0e1cd79a6fdf7f006516c
SHA2566d29dfd24695535b5973d8261d93373603ceaae03ab97662fe1b3dcc47d18226
SHA51281c87f9d56a8ab7703a4effd3ba7b982b6765ecbdc0dbb1c595f549c4310a5db57dcdc38929eafe56983ea8cefc0b572c3faf82a4b62eb7c564b05550215f1c1
-
Filesize
11KB
MD50a29e1b270ccea61aba7d7cdd10e0388
SHA176bf03361bcaef475ffb864bc1903c9bcaac7b44
SHA25667328334d53e7c0c52c23ef5febeb1ab34d87ab7699868a9f547e5b0db4fdceb
SHA512d024407b0852155c225852e6dd1a5440241a16c4b54a408606318ad142381ebf51bc8db09a4d175369619aaac2224311914892d23f763f7b533a6b664b93cf7c
-
Filesize
193KB
MD5e390287499549de31da007f7f0ae4d10
SHA1a8c6caebb151d60ea56f4c96a7194c0e5f076692
SHA256b2e3b0e8d6c3fd23dc7d94fccc5151f07bf2e59271431268a58b5e99074b825b
SHA5126c393bca7ea74747917e65f2e5e4822f034ef60defa5f3232b8f9a731ac8e00cffee3d44ab817f3986739b685506e0027647de50b3534e3436ca569d0c25b474
-
Filesize
255KB
MD5fceee0026aafd237afdb4aea4ecd3557
SHA13e10da57143599eae915a688178abada78b8d82b
SHA25685db1e17c0fad08d9732405e781cda1e1613ace31c540a6e559cd8777df2c62c
SHA5129c974918c8afec8d8a58fc1239f269544b9dfe867459bb61901462f56f71a3dd574d3b2263dd14b99ff8a23c8096c408be3620785fd4476b975a43b999f559f2
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f
-
Filesize
62KB
MD5a990de9edf0145ca5b01761978f49432
SHA11415f5d123dcc03f286548607bb8238826cae858
SHA256338187c9d996921e45efbbc6d558f75d2eed32fb73cfd2a14189ec039091fc65
SHA51232541e89523dfbbb891a215c1e7261d83a79db5ac3cea711c48f7525e98988955716a86a2ecd0264f04a36c8c8f031af57bd7a16496b3b2fcce055d1264d22de
-
Filesize
62KB
MD5a990de9edf0145ca5b01761978f49432
SHA11415f5d123dcc03f286548607bb8238826cae858
SHA256338187c9d996921e45efbbc6d558f75d2eed32fb73cfd2a14189ec039091fc65
SHA51232541e89523dfbbb891a215c1e7261d83a79db5ac3cea711c48f7525e98988955716a86a2ecd0264f04a36c8c8f031af57bd7a16496b3b2fcce055d1264d22de