Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 11:29
Behavioral task
behavioral1
Sample
easy_Benign_ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
easy_Benign_ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326.dll
Resource
win10v2004-20230703-en
General
-
Target
easy_Benign_ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326.dll
-
Size
5KB
-
MD5
419dde60c503fcd63cd47af6d2c4aff1
-
SHA1
85e3b53de0018685ef7fd00977a36b0bdc073668
-
SHA256
ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326
-
SHA512
218cac2bf4199cd57a86736ead52806350ebe3698eadcac61e03e653859c39773e3a2d22ece3a560362a6f1d51b93d9de2389ca2e8eca17c9a7e1a29e23d044a
-
SSDEEP
48:6BqvR+oisA/jGtJDAhFYUWQJg5dcipdK2JhIN3qO9UytVXMa84rygy5ISBo1SeJ2:i9o3rU9En1IrWytx7GjSSBox01s+k
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/2332-133-0x0000000010020000-0x000000001002B000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/2332-133-0x0000000010020000-0x000000001002B000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{A216D56A-A4B4-4E01-B453-0BA6B6723A25}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2264 2332 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 2332 4124 rundll32.exe 84 PID 4124 wrote to memory of 2332 4124 rundll32.exe 84 PID 4124 wrote to memory of 2332 4124 rundll32.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\easy_Benign_ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\easy_Benign_ffec1e28e8114b8b6c4a150412f9d4787974b41186f72aa57933af2dd3d73326.dll,#12⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 6003⤵
- Program crash
PID:2264
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2332 -ip 23321⤵PID:3576