Analysis
-
max time kernel
37s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe
Resource
win10v2004-20220812-en
General
-
Target
c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe
-
Size
1.2MB
-
MD5
961267ff4fb15c0faa9596b3cc7a6369
-
SHA1
9b9ea3b7336754d0938398091580a41499a31319
-
SHA256
c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05
-
SHA512
c1ba45d55fabafc5b9a348038e474677a52efbd000c900f47dcfbfd552b82894c0dc872fdf3b6abe0f799a861e4d936e7679827d18bb26fc7e5c25fc0a43c2e2
-
SSDEEP
24576:69WC988bu6CoKrbkz82LErXZK8mLE4VqaqKXqSM0s34Vx1:6B88TCoo4z820XY8mdxXHQy3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001445d-67.dat acprotect behavioral1/files/0x0006000000014463-68.dat acprotect behavioral1/files/0x0006000000014463-69.dat acprotect behavioral1/memory/1712-74-0x0000000074800000-0x000000007480A000-memory.dmp acprotect -
Executes dropped EXE 1 IoCs
pid Process 1712 ec55Installer.exe -
resource yara_rule behavioral1/files/0x000600000001445d-67.dat upx behavioral1/files/0x0006000000014463-68.dat upx behavioral1/files/0x0006000000014463-69.dat upx behavioral1/memory/1712-74-0x0000000074800000-0x000000007480A000-memory.dmp upx -
Loads dropped DLL 14 IoCs
pid Process 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe 1712 ec55Installer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x000b000000012752-55.dat nsis_installer_1 behavioral1/files/0x000b000000012752-55.dat nsis_installer_2 behavioral1/files/0x000b000000012752-57.dat nsis_installer_1 behavioral1/files/0x000b000000012752-57.dat nsis_installer_2 behavioral1/files/0x000b000000012752-56.dat nsis_installer_1 behavioral1/files/0x000b000000012752-56.dat nsis_installer_2 behavioral1/files/0x000b000000012752-59.dat nsis_installer_1 behavioral1/files/0x000b000000012752-59.dat nsis_installer_2 behavioral1/files/0x000b000000012752-61.dat nsis_installer_1 behavioral1/files/0x000b000000012752-61.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26 PID 1608 wrote to memory of 1712 1608 c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe"C:\Users\Admin\AppData\Local\Temp\c003660d5c9a6073d14d3ffb09aa315b1e8ffe1aea7afbd7628320710a7bcf05.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\temp\ec55Installer.exe"C:\Users\Admin\AppData\Local\temp\ec55Installer.exe" /KEYWORD=ec55 "/PATHFILES=C:\Users\Admin\AppData\Local\temp\"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD526203d9c7822dc99464204ee35be7f16
SHA1543438bb6f176412a63d2c1fd4077ad2b1b307bd
SHA25676a24e095ba755b1edcc5f0bd4818076432154ed4af7a4cded5eed9967faa255
SHA512dff0dccc13df842c54012b893ca2f3aafb7daa2b6182aaa72251d39eb7fe425ce81f9c3c20f1165579d3482f9fa468f604c0272518a7f82b1b62e47d8b4433ff
-
Filesize
808KB
MD526203d9c7822dc99464204ee35be7f16
SHA1543438bb6f176412a63d2c1fd4077ad2b1b307bd
SHA25676a24e095ba755b1edcc5f0bd4818076432154ed4af7a4cded5eed9967faa255
SHA512dff0dccc13df842c54012b893ca2f3aafb7daa2b6182aaa72251d39eb7fe425ce81f9c3c20f1165579d3482f9fa468f604c0272518a7f82b1b62e47d8b4433ff
-
Filesize
206KB
MD5a2e55addab424dde6b7bbf5cc9380d11
SHA135c8c557a1a40aed468e31088e77a49ab54e4d0a
SHA2564dd825b3655dc266cfc6d4b612b368136d43cc2dff8737204f4cfa086c7995a9
SHA5120781aed737cbd9c8511721d64db47390cf6242a2cb8fd76646a57361d5496c8a87f396e30fa70cab8d6b0150184aa5b27d9163a76fbbb9f4538aaa3dc002c09e
-
Filesize
25KB
MD5e5306ec2d3a31101c1a5437a26f7406b
SHA1ca9310bfefd1a99a75f81daf723bd0c20afe51f7
SHA2565d6fb3c0409d61e32486546e70d3b492666984aba26d547b58d48f5f5bb10091
SHA512a62680a29ee83431078ccc8a1421f29a714495aab102fad7752f0606db6c54211e839251fcb6d27081701483caf6ea54b60d26b1162940b783346271253387ca
-
Filesize
602B
MD5dcfa3bb9c13955882fff6d0a5ea23b09
SHA18535eb713bd65340f8e351296da1bfeded5bbb10
SHA256caa36b92bce3e68e20dbc352179aeccb78aa58c8e47e734e78e3b5600863feed
SHA512bc7d9d0405428d8ad97005849a46201a86f75f279df9fa128fb073d91df1c6a1eaf8e63e5437df5266ed42da2030b30feb2fdf64c5a783a98522c998f3e163fe
-
Filesize
808KB
MD526203d9c7822dc99464204ee35be7f16
SHA1543438bb6f176412a63d2c1fd4077ad2b1b307bd
SHA25676a24e095ba755b1edcc5f0bd4818076432154ed4af7a4cded5eed9967faa255
SHA512dff0dccc13df842c54012b893ca2f3aafb7daa2b6182aaa72251d39eb7fe425ce81f9c3c20f1165579d3482f9fa468f604c0272518a7f82b1b62e47d8b4433ff
-
Filesize
808KB
MD526203d9c7822dc99464204ee35be7f16
SHA1543438bb6f176412a63d2c1fd4077ad2b1b307bd
SHA25676a24e095ba755b1edcc5f0bd4818076432154ed4af7a4cded5eed9967faa255
SHA512dff0dccc13df842c54012b893ca2f3aafb7daa2b6182aaa72251d39eb7fe425ce81f9c3c20f1165579d3482f9fa468f604c0272518a7f82b1b62e47d8b4433ff
-
Filesize
808KB
MD526203d9c7822dc99464204ee35be7f16
SHA1543438bb6f176412a63d2c1fd4077ad2b1b307bd
SHA25676a24e095ba755b1edcc5f0bd4818076432154ed4af7a4cded5eed9967faa255
SHA512dff0dccc13df842c54012b893ca2f3aafb7daa2b6182aaa72251d39eb7fe425ce81f9c3c20f1165579d3482f9fa468f604c0272518a7f82b1b62e47d8b4433ff
-
Filesize
4KB
MD555788069d3fa4e1daf80f3339fa86fe2
SHA1d64e05c1879a92d5a8f9ff2fd2f1a53e1a53ae96
SHA256d6e429a063adf637f4d19d4e2eb094d9ff27382b21a1f6dccf9284afb5ff8c7f
SHA512d3b1eec76e571b657df444c59c48cad73a58d1a10ff463ce9f3acd07acce17d589c3396ad5bdb94da585da08d422d863ffe1de11f64298329455f6d8ee320616
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
6KB
MD5f8462e9d1d7fd39789afca89ab6d6046
SHA17e9a518e15b7490245d2bef11a73f209c8d8d59b
SHA25648941e9f5c92a33f1e60a7a844d562dd77ce736fd31b5503c980b49679dfe85e
SHA51257dee2253abd7d17d53811d5e95237f9434288518fb043645524a517786db2d8a91df86a6da732c620f12ad0e7ea30a923b8d5f3de386c65bd3ff240bc0dff69
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f