Analysis
-
max time kernel
139s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe
Resource
win7-20221111-en
General
-
Target
c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe
-
Size
4.6MB
-
MD5
5b19344a709fe3ebf73c1e51e396566e
-
SHA1
b755f2551f7bf1a2565f7cfcf61ed292a7778ffc
-
SHA256
c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27
-
SHA512
04bc377b1e158f3647488be4d13d3f8e0eddfe3830ac7f94582887637f1f1f34fea58ba670a95b332f329037ffdc157ed454a3a036fe447f74d4f2cf0bf64701
-
SSDEEP
98304:iawUlyKMqrmENeUUNOw5/YO5+55W7BmNvoPcup99pS+WAMjMKWOc:FZ92NBF+jIBmGPcupPjWMQc
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022e11-147.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 4296 VCL.exe 3560 VCLR.exe 4520 VCLR.exe 3048 VCL.exe -
resource yara_rule behavioral2/files/0x0008000000022e11-147.dat upx -
Loads dropped DLL 14 IoCs
pid Process 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\VCL.dll VCLR.exe File opened for modification C:\Windows\SysWOW64\VCL.dll VCLR.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files (x86)\IGS\VCCert.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\libplds4.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCLR.exe c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCL64.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCLR64.exe c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\nss3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\nssutil3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\sqlite3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\nssdbm3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\ssl3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCL.exe c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\libplc4.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\nssckbi.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\smime3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCL.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\freebl3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\libnspr4.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\softokn3.dll c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCLR.ini c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe File created C:\Program Files (x86)\IGS\VCL.tlb c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3560 VCLR.exe 3560 VCLR.exe 4520 VCLR.exe 4520 VCLR.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe 3048 VCL.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4520 VCLR.exe 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4520 VCLR.exe Token: SeDebugPrivilege 3048 VCL.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4296 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 84 PID 3376 wrote to memory of 4296 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 84 PID 3376 wrote to memory of 4296 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 84 PID 3376 wrote to memory of 3560 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 85 PID 3376 wrote to memory of 3560 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 85 PID 3376 wrote to memory of 3560 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 85 PID 3376 wrote to memory of 4520 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 87 PID 3376 wrote to memory of 4520 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 87 PID 3376 wrote to memory of 4520 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 87 PID 3376 wrote to memory of 3048 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 90 PID 3376 wrote to memory of 3048 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 90 PID 3376 wrote to memory of 3048 3376 c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe"C:\Users\Admin\AppData\Local\Temp\c26947930ed7e6004782692951701ea343f7235656eab3b1ac3dfca67b8b9b27.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\IGS\VCL.exeVCL.exe /IsOtherInstalled2⤵
- Executes dropped EXE
PID:4296
-
-
C:\Program Files (x86)\IGS\VCLR.exeVCLR.exe -lr2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\IGS\VCLR.exeVCLR.exe -b -d VCL.dll2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Program Files (x86)\IGS\VCL.exeVCL.exe /UploadLogs /Reason RLSP2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
1.7MB
MD5e706e8132c5473a737e38d63ded96f79
SHA1ae066336773217fd647c50c67437b45429ea87ed
SHA256a107f542951a192ebe1d771c17de9ba13f2761116ae1125089203362a90a5d52
SHA512f5eeb8973d2ac406ad0353fa785ceb33d60ec8f88eebff72d959a5333f847d5443096248697641420233d1f75ad3d5af4f1eee6f54f36f3f7c507cfa3836808a
-
Filesize
1.7MB
MD5e706e8132c5473a737e38d63ded96f79
SHA1ae066336773217fd647c50c67437b45429ea87ed
SHA256a107f542951a192ebe1d771c17de9ba13f2761116ae1125089203362a90a5d52
SHA512f5eeb8973d2ac406ad0353fa785ceb33d60ec8f88eebff72d959a5333f847d5443096248697641420233d1f75ad3d5af4f1eee6f54f36f3f7c507cfa3836808a
-
Filesize
1.7MB
MD5e706e8132c5473a737e38d63ded96f79
SHA1ae066336773217fd647c50c67437b45429ea87ed
SHA256a107f542951a192ebe1d771c17de9ba13f2761116ae1125089203362a90a5d52
SHA512f5eeb8973d2ac406ad0353fa785ceb33d60ec8f88eebff72d959a5333f847d5443096248697641420233d1f75ad3d5af4f1eee6f54f36f3f7c507cfa3836808a
-
Filesize
283KB
MD5b887c4da88fe7f6a7cf2ee8165fa0ef4
SHA163b4a35c51582fda6bd704d23f89a886ba5387cc
SHA25678a91d9f6b853129632b78a06c5d62ffb475f5946ce255fa4cc7a5b129c4597a
SHA5123eddc0f8a8d1451820c305a2d859f270c09463425c60b21f3d67bdc24a5142a1a6b31f002742aa81e3477d09452160a390d97faa42c97bbf4aab0ba573f39a2b
-
Filesize
283KB
MD5b887c4da88fe7f6a7cf2ee8165fa0ef4
SHA163b4a35c51582fda6bd704d23f89a886ba5387cc
SHA25678a91d9f6b853129632b78a06c5d62ffb475f5946ce255fa4cc7a5b129c4597a
SHA5123eddc0f8a8d1451820c305a2d859f270c09463425c60b21f3d67bdc24a5142a1a6b31f002742aa81e3477d09452160a390d97faa42c97bbf4aab0ba573f39a2b
-
Filesize
283KB
MD5b887c4da88fe7f6a7cf2ee8165fa0ef4
SHA163b4a35c51582fda6bd704d23f89a886ba5387cc
SHA25678a91d9f6b853129632b78a06c5d62ffb475f5946ce255fa4cc7a5b129c4597a
SHA5123eddc0f8a8d1451820c305a2d859f270c09463425c60b21f3d67bdc24a5142a1a6b31f002742aa81e3477d09452160a390d97faa42c97bbf4aab0ba573f39a2b
-
Filesize
116B
MD51b97d004c654307e875388012d0292de
SHA1148c8df905ec0520b6a7651f39e655f3f045e4f8
SHA2568f0b39d6d8f910fa2c45cc2db0905ac889ed975629c531ee417964258388a888
SHA51284d0775e806a679bffee5f9a8c5a8faf543be35be7410281184da3474d448de7c7882108ea1126a6a971506634fb8d78b139c796c1041906f0997231e18123b5
-
Filesize
1KB
MD5dd179d3d62278cda7218c602f9370756
SHA1d0b040bc661d281030e2492533f70e3ad1af5076
SHA25629852f313ebcbf09f4222bc89a337394b776ed538ac5acaa84697d9b715c3783
SHA5129f7b699cbb58cb50f283922c42e4d29043a5d78ee26b8d0693c31ba051cd22472cec255dc452c039e70ec9a2c1ab3d6bb907834b852b9933f3bdaeed090e618d
-
Filesize
2KB
MD5c736a0711843867eed167cb70d118ffb
SHA1d79befe5c5d01293e7e153a42732e2561af9663b
SHA256fb6aea3330eccaa5a9afd97dcd02f8c9530b28da12d9a054e068faefc2140447
SHA51249d8b778756332fa617591b47336eb8be939da7fa1b5ca47d77f3ae1f888ae2f84b04da2010e79b0a89c1c88eea4ea370db566304fd4f9c79a756b912a1ee63f
-
Filesize
945B
MD5a4bf177ad644bed63f862b155ec95278
SHA1e3e9c97c19d641d3cd0a1424ee1e6cab9533296c
SHA2560fe680c90f7334b431ba6b4e95dbb869d24404aa764bd50cf39088e9972dedc4
SHA512195e1570f4aaad84cbc248dcca3d8bd3c43975047746a4090655c52de36906929d7d4e29ff39b0c55b090a016d5e3bfd16e78eea78b68dc3ff4f600eea8e7049
-
Filesize
6KB
MD5dc9562578490df8bc464071f125bfc19
SHA156301a36ae4e3f92883f89f86b5d04da1e52770d
SHA2560351fe33a6eb13417437c1baaee248442fb1ecc2c65940c9996bcda574677c3f
SHA5129242f8e8ece707874ef61680cbfcba7fc810ec3a03d2cb2e803da59cc9c82badd71be0e76275574bc0c44cdfcef9b6db4e917ca8eb5391c5ae4b37e226b0c321
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed
-
Filesize
327KB
MD585e369896d7049fa73dff2064a9df4db
SHA10dfc08029e9909aa7478883fbc4d12cccdb76c41
SHA2561cbe3267055d7dbf2c6a13167b7948db3a5f422fd9724e16ce9659fc8277132c
SHA5126407bbf37abdc28d5a4e36710e97e483fe09bb27c647d8de4f0b797d061fa882ca57782462d6032018d234402d3c75fa94e8716f3657a5bbde15dea2931efaed