Analysis

  • max time kernel
    106s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 07:01

General

  • Target

    ddab3f303c73af5d177f3184460bf252086070d4903b5a2e62d10d7d2746ca50.exe

  • Size

    672KB

  • MD5

    fabb7f9d68af13cf3d1b7ef960de873b

  • SHA1

    c85c35e4bc3d31df0b01e1cc7aa853fa267f5ff9

  • SHA256

    ddab3f303c73af5d177f3184460bf252086070d4903b5a2e62d10d7d2746ca50

  • SHA512

    3389dfc6c7c9d3f39568c73b304c25ee3a9535ce953b331e01a91eac17176e2ed87c0e856994c4a4aede6705b980bef72c34be09e7a53dfe4c2990bf8540c0f5

  • SSDEEP

    12288:3p55AjS3kgycFN2HCUU5n7n8qxGupT4gPw9dWl73VELvUZeN9:3pvAjSYniUg8qxLqgPw9Ul7lQvoE9

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 9 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddab3f303c73af5d177f3184460bf252086070d4903b5a2e62d10d7d2746ca50.exe
    "C:\Users\Admin\AppData\Local\Temp\ddab3f303c73af5d177f3184460bf252086070d4903b5a2e62d10d7d2746ca50.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\BoerSD9738_Setup1.exe
      "C:\BoerSD9738_Setup1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Program Files (x86)\Deninecer.exe
        "C:\Program Files (x86)\Deninecer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies Internet Explorer Automatic Crash Recovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:680
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:680 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1512
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""c:\BoerSD9738_Setup1.exe_And xMe.bat""
        3⤵
          PID:1312
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1972

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\1.jpg

      Filesize

      9KB

      MD5

      51540d55d55c7fbb49adbff8e7818aeb

      SHA1

      8ab71c05ed9d34fd21c2ceb593f05a602734bf77

      SHA256

      fde80b0f260e173607350cd6cfd165935cb8f6db6377d0132476e35d4171de9a

      SHA512

      cfb30310fce7c7b2dc0243f93f12fd1420de351e6997cc999161b72a20e01a31e3d84f7d3f2e0fc9b0a31d61869aa8aa4066b4c7d259edfa5348712b4c5826a0

    • C:\BoerSD9738_Setup1.exe

      Filesize

      686KB

      MD5

      f87969558111eb3e3e80bb1f76067307

      SHA1

      41f2a6f275a021707aef429e8bbe322a159bfff0

      SHA256

      2b71bddbe4969cc52e694b1ef9cc181ef72513d925992f5ee19b502854eeb692

      SHA512

      0cdbc03390153f2c3a936bf665dc17b18320477f52831cc299889fe792c1d97f9667e6cb29939934e4644c9b704bffc0c77f350d81fd36f1c05e6ec8268973d8

    • C:\BoerSD9738_Setup1.exe

      Filesize

      686KB

      MD5

      f87969558111eb3e3e80bb1f76067307

      SHA1

      41f2a6f275a021707aef429e8bbe322a159bfff0

      SHA256

      2b71bddbe4969cc52e694b1ef9cc181ef72513d925992f5ee19b502854eeb692

      SHA512

      0cdbc03390153f2c3a936bf665dc17b18320477f52831cc299889fe792c1d97f9667e6cb29939934e4644c9b704bffc0c77f350d81fd36f1c05e6ec8268973d8

    • C:\Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • C:\Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

      Filesize

      72KB

      MD5

      f79ee77a4f30401507e6f54a61598f58

      SHA1

      7f3ef4945f621ed2880ff5a10a126957b2011a17

      SHA256

      cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8

      SHA512

      26ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739

    • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      112KB

      MD5

      6d4b2e73f6f8ecff02f19f7e8ef9a8c7

      SHA1

      09c32ca167136a17fd69df8c525ea5ffeca6c534

      SHA256

      fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

      SHA512

      2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

    • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      112KB

      MD5

      6d4b2e73f6f8ecff02f19f7e8ef9a8c7

      SHA1

      09c32ca167136a17fd69df8c525ea5ffeca6c534

      SHA256

      fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

      SHA512

      2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

    • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      409KB

      MD5

      c3d354bdf277263b13dca264ec2add9d

      SHA1

      b428dfd7df0f6024e22838823cc702e2293bd314

      SHA256

      ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f

      SHA512

      24c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3PW3KQE1.txt

      Filesize

      603B

      MD5

      78c88d0655c264a6b80bbb8f160f0eb8

      SHA1

      ad5931ab2f101f6c9961a603a6c272ffc8fb7d69

      SHA256

      4213b7e5f6914a72f03df184ae6ab6f58e51de271fe2cf169ab4cb15add38f44

      SHA512

      13d29cbf4a9e6eb613ba902d0c32e61c20ff80374d732b15a37a524d49f38410bd1a2b4aee076d35617be8ef632f5368aea4eefe8f6b45c4773dc97065bfe2ed

    • \??\c:\BoerSD9738_Setup1.exe_And xMe.bat

      Filesize

      90B

      MD5

      ceddda43614a8f08deafe532f288d375

      SHA1

      68205cc3cc6203570457e49e2785a21b043936b8

      SHA256

      c1c41d6918ab93017e74b46ff1ef79d01de613c413d0134cee13480f8bc08d54

      SHA512

      b1b874ca14d329ca9c5ff71e7d1c618ee1c5380b4db399d59e473d12a07c8f32d9fbb99ee1bbbf988f09623313c3fc912213a4c4046ebdcc3c05815be7f41767

    • \Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • \Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • \Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • \Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • \Program Files (x86)\Deninecer.exe

      Filesize

      42.9MB

      MD5

      86dc385f048edf6437e6ea0f094b72b1

      SHA1

      e85c098a331322e54c609fb92b8c7a42a045371b

      SHA256

      f50ab642335aabf42f5cc19eba246d87f574ee9f5914c51f974f19b5d6fd0812

      SHA512

      f38464bf7fea7f2eb4e1d6f518d7cdcc05a0d41dd274dea2f9226dd854114365a9fe212be12ea618ffd5a764b928c892b2b0ba6182df1fde785af8283500b9bd

    • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      112KB

      MD5

      6d4b2e73f6f8ecff02f19f7e8ef9a8c7

      SHA1

      09c32ca167136a17fd69df8c525ea5ffeca6c534

      SHA256

      fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

      SHA512

      2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

    • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      112KB

      MD5

      6d4b2e73f6f8ecff02f19f7e8ef9a8c7

      SHA1

      09c32ca167136a17fd69df8c525ea5ffeca6c534

      SHA256

      fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

      SHA512

      2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

    • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      409KB

      MD5

      c3d354bdf277263b13dca264ec2add9d

      SHA1

      b428dfd7df0f6024e22838823cc702e2293bd314

      SHA256

      ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f

      SHA512

      24c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e

    • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      409KB

      MD5

      c3d354bdf277263b13dca264ec2add9d

      SHA1

      b428dfd7df0f6024e22838823cc702e2293bd314

      SHA256

      ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f

      SHA512

      24c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e

    • memory/468-92-0x0000000010000000-0x0000000010129000-memory.dmp

      Filesize

      1.2MB

    • memory/468-91-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/468-80-0x0000000000360000-0x000000000037E000-memory.dmp

      Filesize

      120KB

    • memory/468-81-0x0000000010000000-0x0000000010129000-memory.dmp

      Filesize

      1.2MB

    • memory/468-78-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1272-77-0x00000000002A0000-0x00000000002D0000-memory.dmp

      Filesize

      192KB

    • memory/1272-87-0x0000000010000000-0x0000000010129000-memory.dmp

      Filesize

      1.2MB

    • memory/1272-86-0x0000000000240000-0x000000000024D000-memory.dmp

      Filesize

      52KB

    • memory/1272-84-0x0000000000280000-0x000000000029E000-memory.dmp

      Filesize

      120KB

    • memory/1272-76-0x0000000010000000-0x0000000010129000-memory.dmp

      Filesize

      1.2MB

    • memory/1272-75-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1272-74-0x00000000002A0000-0x00000000002D0000-memory.dmp

      Filesize

      192KB

    • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

      Filesize

      8KB