Analysis
-
max time kernel
62s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe
Resource
win10v2004-20220901-en
General
-
Target
c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe
-
Size
1.3MB
-
MD5
640a457de71b1c7b27103371728d2877
-
SHA1
3047a1f852a77394ad098d1f923f78e33159388f
-
SHA256
c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16
-
SHA512
d33ec0ead82bd895567ec00eca5881c5b3705b78d5d53e04870adc6ec91bce4c49dacde847e8679f46c4821bedce48b037dcd3480b6dfe16e704301741dc4379
-
SSDEEP
24576:2GkveWENzeMhReJj/cOzo/pDuSR5wsXwzMPJz/51oR3:woNeQ+/tzouSR5/hP5LW
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022de8-134.dat acprotect behavioral2/files/0x0007000000022de8-133.dat acprotect -
Loads dropped DLL 9 IoCs
pid Process 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\NSISLog c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe File created C:\Program Files (x86)\Common Files\NSISLog\Lang2052.DAT c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe File opened for modification C:\Program Files (x86)\Common Files\NSISLog\Lang2052.DAT c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe"C:\Users\Admin\AppData\Local\Temp\c41b999771e5520c02dda8c4a8f93e959268e464b8401eb27a9bf3c3c4e3bd16.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
Filesize
12KB
MD583304a78d2b6ea45ea8404f4cd78721f
SHA1d5c5d19653c751c08579dd094bcc9fef1841af00
SHA25692344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414
SHA51294076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf