Analysis

  • max time kernel
    180s
  • max time network
    238s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:26

General

  • Target

    f2118ee1219fe02b5126a778e0ffd4c3cc786b3d7af50c67978c4c18163e1e8b.exe

  • Size

    128KB

  • MD5

    6482d1c8f3ba54f893f3cf5b329be842

  • SHA1

    60b8228e6b2c0a450e6d848b9cd87788fcc8efa0

  • SHA256

    f2118ee1219fe02b5126a778e0ffd4c3cc786b3d7af50c67978c4c18163e1e8b

  • SHA512

    ee6086a165c55d2c6b44865526bcc00881b8d19b947917ac182541ee1eb6854b4531b60ca495cd64664b576b9496e35f111ac18fa46742219750a18d336dc8ef

  • SSDEEP

    3072:uc2Elfx2kDYp6YCaW5yqC6r/bb1Cq3EueWKPtE:qEvYE1Aq0VWKP

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2118ee1219fe02b5126a778e0ffd4c3cc786b3d7af50c67978c4c18163e1e8b.exe
    "C:\Users\Admin\AppData\Local\Temp\f2118ee1219fe02b5126a778e0ffd4c3cc786b3d7af50c67978c4c18163e1e8b.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4632

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\msxml71.dll

          Filesize

          101KB

          MD5

          5375ddac29dc43764b53d247ea2c754e

          SHA1

          1a013d318faa5d63390b83b3637b83a435e3e80a

          SHA256

          336140e3474f34803632d6c5edab68670f8a69590ee48390591279efe6259702

          SHA512

          cb681f82bb97e1d93ae8e7290eea514c3b0f370228de2999e76c12088d60a4b228a11215df26c0b206025001990007012786a1fb9ccfa9c03b56dbea1a657659

        • memory/4632-133-0x0000000010000000-0x000000001004C000-memory.dmp

          Filesize

          304KB