Analysis
-
max time kernel
55s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 17:23
Static task
static1
Behavioral task
behavioral1
Sample
e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe
Resource
win10v2004-20220812-en
General
-
Target
e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe
-
Size
104KB
-
MD5
3d4934a48e0cdcc7dd674ccf4dd362f8
-
SHA1
cbf3d6406827016478dfaf16aa3c18ca76f80fab
-
SHA256
e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8
-
SHA512
dca583b6aa529ed83bf2607e3359aac9f516635889831104a3fbb8635f2e33f1983da0d76cd3dcd98adefceaed201dd2d8e737ce7677533135f0703715cbf6b5
-
SSDEEP
3072:IgXdZt9P6D3XJbC8s1tvTTDNjl3MQSRLHhb4ek+rBDl3tqw:Ie3448etxjl3MfL1zDww
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000132fb-57.dat acprotect behavioral1/files/0x000b0000000132fb-58.dat acprotect behavioral1/files/0x000b0000000132fb-59.dat acprotect behavioral1/files/0x000b0000000132fb-60.dat acprotect behavioral1/files/0x000b0000000132fb-61.dat acprotect -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 1120 rundll32.exe 8 1120 rundll32.exe -
resource yara_rule behavioral1/files/0x000b0000000132fb-57.dat upx behavioral1/files/0x000b0000000132fb-58.dat upx behavioral1/files/0x000b0000000132fb-59.dat upx behavioral1/files/0x000b0000000132fb-60.dat upx behavioral1/files/0x000b0000000132fb-61.dat upx -
Loads dropped DLL 4 IoCs
pid Process 1120 rundll32.exe 1120 rundll32.exe 1120 rundll32.exe 1120 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 912 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1120 rundll32.exe 1120 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 2016 wrote to memory of 1120 2016 e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe 28 PID 1120 wrote to memory of 1972 1120 rundll32.exe 32 PID 1120 wrote to memory of 1972 1120 rundll32.exe 32 PID 1120 wrote to memory of 1972 1120 rundll32.exe 32 PID 1120 wrote to memory of 1972 1120 rundll32.exe 32 PID 1972 wrote to memory of 912 1972 cmd.exe 34 PID 1972 wrote to memory of 912 1972 cmd.exe 34 PID 1972 wrote to memory of 912 1972 cmd.exe 34 PID 1972 wrote to memory of 912 1972 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe"C:\Users\Admin\AppData\Local\Temp\e6195d43acdbfca10f97fe1230b0d1d16b67c0d51babc3f18abcf27ba62b45b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\nSVYTsRt.dll",Install C:\Users\Admin\AppData\Local\Temp\nSVYTsRt2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\nSVYTsRt.dll" >> nul3⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.14⤵
- Runs ping.exe
PID:912
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD572978773925678f4a39611b43ad4faa7
SHA16fa4bbef64c5545a064930dd46e38c21c2521ff7
SHA25618b1bdf615e5e6b60b1fbf226b7bf18216b1f286012952c02530b93285d4eba0
SHA5129aff763908621f2522fea8e2c663448c52d882a4896d341aa34402e501a6d3b978f0eff0d2014c006ad8258fd0c17aee77917229c280e3d1b495f452df734902
-
Filesize
73KB
MD56b1b2ab3fc622299dcad52f581855419
SHA1bcab8a82e52f582983d668bc1f32ae9cf508110b
SHA2560926a2f0732014450a1897ec287d36642353bc5e4aa1ad4500d340bc20394d48
SHA5129382791e6e140321146eb6e67af14cae9473d955eaa6bcd520a917b9ebde5a78464318e22bcb25b264561596c35f26275bea7a37040257ed80befa7c398816a5
-
Filesize
73KB
MD56b1b2ab3fc622299dcad52f581855419
SHA1bcab8a82e52f582983d668bc1f32ae9cf508110b
SHA2560926a2f0732014450a1897ec287d36642353bc5e4aa1ad4500d340bc20394d48
SHA5129382791e6e140321146eb6e67af14cae9473d955eaa6bcd520a917b9ebde5a78464318e22bcb25b264561596c35f26275bea7a37040257ed80befa7c398816a5
-
Filesize
73KB
MD56b1b2ab3fc622299dcad52f581855419
SHA1bcab8a82e52f582983d668bc1f32ae9cf508110b
SHA2560926a2f0732014450a1897ec287d36642353bc5e4aa1ad4500d340bc20394d48
SHA5129382791e6e140321146eb6e67af14cae9473d955eaa6bcd520a917b9ebde5a78464318e22bcb25b264561596c35f26275bea7a37040257ed80befa7c398816a5
-
Filesize
73KB
MD56b1b2ab3fc622299dcad52f581855419
SHA1bcab8a82e52f582983d668bc1f32ae9cf508110b
SHA2560926a2f0732014450a1897ec287d36642353bc5e4aa1ad4500d340bc20394d48
SHA5129382791e6e140321146eb6e67af14cae9473d955eaa6bcd520a917b9ebde5a78464318e22bcb25b264561596c35f26275bea7a37040257ed80befa7c398816a5
-
Filesize
73KB
MD56b1b2ab3fc622299dcad52f581855419
SHA1bcab8a82e52f582983d668bc1f32ae9cf508110b
SHA2560926a2f0732014450a1897ec287d36642353bc5e4aa1ad4500d340bc20394d48
SHA5129382791e6e140321146eb6e67af14cae9473d955eaa6bcd520a917b9ebde5a78464318e22bcb25b264561596c35f26275bea7a37040257ed80befa7c398816a5