Analysis
-
max time kernel
143s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe
Resource
win7-20220812-en
General
-
Target
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe
-
Size
3.3MB
-
MD5
43aa5883728a5313f3d9e7a09a9748e6
-
SHA1
85a186323eaf30670bf3d9b1bcbe1b1dbece7290
-
SHA256
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25
-
SHA512
4e821d5beff9e3ba941abbe71296c3c4b465f2198c6c6d5efb58e3fe24a0603b9b3d7be231d89582891097e6e7f2d2e06422a2be85cc76d4faedc6d6a59bf0ce
-
SSDEEP
98304:lGIXFUKtu0E4JJ4aGUtqTmoAsziWBWXCe9rXm:IA940VD4aZym4zivSObm
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll acprotect -
Disables RegEdit via registry modification 2 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "0" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll upx behavioral1/memory/816-69-0x0000000002400000-0x000000000243D000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/816-57-0x0000000002E20000-0x0000000002FED000-memory.dmp vmprotect behavioral1/memory/816-59-0x0000000002E20000-0x0000000002FED000-memory.dmp vmprotect behavioral1/memory/816-65-0x0000000002E20000-0x0000000002FED000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exepid process 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Drops file in System32 directory 2 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription ioc process File created C:\Windows\SysWOW64\svchost.exe 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe File opened for modification C:\Windows\SysWOW64\svchost.exe 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exepid process 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?kfi1997" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?28879" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kfi1997" 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Modifies registry class 2 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exepid process 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exepid process 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exedescription pid process target process PID 816 wrote to memory of 1544 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 1544 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 1544 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 1544 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 772 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 772 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 772 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe PID 816 wrote to memory of 772 816 19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe"C:\Users\Admin\AppData\Local\Temp\19bd2ae776b6bc4e984a52377b4c41f400205ed0d525044e4653e1cb6e71db25.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:1544
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
676KB
MD5033d1db88147b6dab9a1795027a87e74
SHA1f6e9f5e82af3e9546711d42aab705a494e851d44
SHA256a85b830cec14449763cc174d600324372798f2bb8c5276546419cc6b2563db1c
SHA5127689fc5812fc89e27f5691259c15e4109b3ecfd1933393e1d9ce2d63acc37149aa4cf6124c353b62b39352162e9509d7b49caeaabc1618c8e495a14cef095e33