Analysis
-
max time kernel
197s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe
Resource
win10v2004-20221111-en
General
-
Target
ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe
-
Size
1007KB
-
MD5
4b7c19d8e6b9549f78cddcc285db9246
-
SHA1
ca65beaa5b5dfc7aae14bddb649f29fce61872ec
-
SHA256
ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5
-
SHA512
1a6a4612db462699a39944ac5814f34c59548a99012ab18dc69386a81da74dfa6076aa1466752fc85066cc6d404daf201d9881797c8cc02a76fe74442e912ab7
-
SSDEEP
24576:CJJ+UFTlpJgd8UqmkDS66iHzYHKqc38+anDNFcl:C28T5g6ZmkDoSNIDNFs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000015629-58.dat acprotect behavioral1/files/0x0006000000015c9b-60.dat acprotect behavioral1/memory/1104-61-0x0000000074C50000-0x0000000074C5A000-memory.dmp acprotect -
resource yara_rule behavioral1/files/0x0006000000015629-58.dat upx behavioral1/files/0x0006000000015c9b-60.dat upx behavioral1/memory/1104-61-0x0000000074C50000-0x0000000074C5A000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 ccc55406984f456f41a9b7e4b9fc21c79c49a48a15ae06d89f48699d23b0b7e5.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD555788069d3fa4e1daf80f3339fa86fe2
SHA1d64e05c1879a92d5a8f9ff2fd2f1a53e1a53ae96
SHA256d6e429a063adf637f4d19d4e2eb094d9ff27382b21a1f6dccf9284afb5ff8c7f
SHA512d3b1eec76e571b657df444c59c48cad73a58d1a10ff463ce9f3acd07acce17d589c3396ad5bdb94da585da08d422d863ffe1de11f64298329455f6d8ee320616
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD57b42ce0bb387ae8a452136da404bf6b0
SHA11d9a116d55be1beb0089e392d5ae342e2bffa8a4
SHA256af19101a9303306e7bb8c3ddb7f1174e43b9b8ef969e78b504545ed6afe42fb7
SHA512c50d4a172af361d2978d4204afb712581ffe558950b775e8f0a9fa29e6e8d2076e603fae5417358dceee30c4d4906d8d2dfb4879028818f0f303b8c21f2f6032
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
5KB
MD502f1858b3131ffc3fc5e3a5391d3a489
SHA1454a6d749cf55ff990bd9f57941aca9d1f1674f6
SHA256f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12
SHA5128147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b