Analysis
-
max time kernel
168s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe
Resource
win10v2004-20220812-en
General
-
Target
aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe
-
Size
175KB
-
MD5
5b5c584130d66c5b832af9e227f93dd6
-
SHA1
6ad9d202343418b64a9eb69a13c9cd82fbce22a5
-
SHA256
aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224
-
SHA512
a49fcdbe47e3fda9458a469b70da8a266879563170fb1156f54786d43410f8c0c13dbfcdaaaaaf44d678a0e20f1fd935f7f53f29a11fc8b0fab7cf0aaecb1b1f
-
SSDEEP
3072:XSB1Ed0h4MEHZB5TiVhf/rw978lBBZty+a2kb7GQx/OfxurGX:XSB1Ed0h/CB5OVhc9wlXZty+Ob6IrrO
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0009000000022dff-134.dat acprotect behavioral2/files/0x0009000000022dff-135.dat acprotect -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 4332 rundll32.exe -
resource yara_rule behavioral2/files/0x0009000000022dff-134.dat upx behavioral2/files/0x0009000000022dff-135.dat upx behavioral2/memory/4332-136-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4332-137-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe -
Loads dropped DLL 1 IoCs
pid Process 4332 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2688 4332 WerFault.exe 79 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4384 wrote to memory of 1900 4384 aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe 78 PID 4384 wrote to memory of 1900 4384 aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe 78 PID 4384 wrote to memory of 1900 4384 aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe 78 PID 1900 wrote to memory of 4332 1900 control.exe 79 PID 1900 wrote to memory of 4332 1900 control.exe 79 PID 1900 wrote to memory of 4332 1900 control.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe"C:\Users\Admin\AppData\Local\Temp\aeb153c09ed6ec7795df80aef5b29f423fe90abaf8f7fc28cb32c09bd67be224.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\VideosFotinhas.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\VideosFotinhas.cpl",3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14084⤵
- Program crash
PID:2688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4332 -ip 43321⤵PID:4496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5e72e024adc6d5f786ae959a33253801b
SHA1dceababcb4370cb2b1ec686897b0b23fc60746a8
SHA2567047b22e1c04def87d215147bbb510123386b74ce3a67bd46275a46b0763fee6
SHA512cc461938f412be6ac011c6c83e50ed32d8896e7c2126aa25bdfd0215b1848931cf0ea7032a7efa6dd5e87694d27272457fdb98683b9d2934f4b6f6dca68cb257
-
Filesize
79KB
MD5e72e024adc6d5f786ae959a33253801b
SHA1dceababcb4370cb2b1ec686897b0b23fc60746a8
SHA2567047b22e1c04def87d215147bbb510123386b74ce3a67bd46275a46b0763fee6
SHA512cc461938f412be6ac011c6c83e50ed32d8896e7c2126aa25bdfd0215b1848931cf0ea7032a7efa6dd5e87694d27272457fdb98683b9d2934f4b6f6dca68cb257