Analysis

  • max time kernel
    163s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:24

General

  • Target

    03d19c30a8d8bb99c5ebbcbc6723675807cdd2ac78e03b21db1202352c020f12.exe

  • Size

    1.6MB

  • MD5

    84b11dd46200e2a33cf4ae6adc285699

  • SHA1

    a017bbd63f16b3389153be81e5d3bc0854749de0

  • SHA256

    03d19c30a8d8bb99c5ebbcbc6723675807cdd2ac78e03b21db1202352c020f12

  • SHA512

    23b1ba450ba7f444c8ba99223dd1d4e8c01fb37645acad26b00fefdd06e4974c908cbf7e90397d53751264fa8c679a032f3b40b8ffdc92e393ea6c43f57daf20

  • SSDEEP

    24576:MLAe58NVmvumzyNeXmQ9Z/ZLNUlAZlab5hDHDjRDToFvxeXAHB6:cAe58Gvn2eXmQdZTZlYfxTk6

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Loads dropped DLL 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d19c30a8d8bb99c5ebbcbc6723675807cdd2ac78e03b21db1202352c020f12.exe
    "C:\Users\Admin\AppData\Local\Temp\03d19c30a8d8bb99c5ebbcbc6723675807cdd2ac78e03b21db1202352c020f12.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\NSISArray.dll

    Filesize

    17KB

    MD5

    2b8574f6a8f5de9042baa43c069d20ba

    SHA1

    07959da0c6b7715b51f70f1b0aea1f56ba7a4559

    SHA256

    38654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564

    SHA512

    f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    68d73a95c628836b67ea5a717d74b38c

    SHA1

    935372db4a66f9dfd6c938724197787688e141b0

    SHA256

    21a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226

    SHA512

    0e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    68d73a95c628836b67ea5a717d74b38c

    SHA1

    935372db4a66f9dfd6c938724197787688e141b0

    SHA256

    21a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226

    SHA512

    0e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914

  • \Users\Admin\AppData\Local\Temp\nsy9763.tmp\fpinstall.dll

    Filesize

    8KB

    MD5

    071b6233c92f69ffa1c24243328c3b94

    SHA1

    bb583c00e87cdc65e6254c7148d37afc1bbb3095

    SHA256

    5f6c63cb0ba539d692c5461730f057d0ec6c60639d772fbdc3753c3c6e746c43

    SHA512

    7fc2db406350488ee86ccffe1e99a91e0f509ef0429063336bf6f96aab07127df352db77fe9d00ddc3aa2db7886dfbac08b6acf6a5c647859956111ca47c24f1

  • \Users\Admin\AppData\Local\Temp\zok95FA.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Windows\SysWOW64\Macromed\Flash\Flash9f.ocx

    Filesize

    2.9MB

    MD5

    48fdf435b8595604e54125b321924510

    SHA1

    e13d25bdac576e95e9134c3f95f0f8cbe94d6185

    SHA256

    7fcd80f7f56a841a4c5ef950afac8991da71ba9eae82f20db2954c7b4b72efd9

    SHA512

    86a59d83cc3d39b752b7a9c98e79b3f8fbcca66087926f026aabf5453bde83321928b77947e2aa5f625a53dafc89c0bf224daa7ce004b1851345abe93c6e83f3

  • memory/2024-56-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2024-64-0x0000000004A80000-0x0000000004EC9000-memory.dmp

    Filesize

    4.3MB

  • memory/2024-54-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

  • memory/2024-57-0x0000000001C20000-0x0000000001C93000-memory.dmp

    Filesize

    460KB

  • memory/2024-69-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2024-70-0x0000000001C20000-0x0000000001C93000-memory.dmp

    Filesize

    460KB