Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 17:45
Static task
static1
Behavioral task
behavioral1
Sample
定制版.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
定制版.exe
Resource
win10v2004-20230703-en
General
-
Target
定制版.exe
-
Size
2.1MB
-
MD5
aae1b4342f51b3d86c079495d51e3c14
-
SHA1
339b0b3d3c9731c4635967ef0204a9632652d7b7
-
SHA256
18b2dbb8e841d1dec7f78133337cacf10660e137606c9ae828da82208e8a64c7
-
SHA512
646c774e6cfe1cc028b3a8b96115b1b6e957e4beb3f88c6afbd85689b307ce53a6d558750a8bf34b6f0e90e611d11e18b43964e7c42119c22d4862e7add76c70
-
SSDEEP
24576:ej4xwmbjW8Xi7UxyhKGQnNO3/Pi0vhTrlwTYs42cYbDyGWBVGZu8BlscURqxbhto:emxHnNWxXhAyGWv4uAPx9to
Malware Config
Signatures
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000900000002316c-189.dat acprotect behavioral2/files/0x000900000002316c-191.dat acprotect behavioral2/files/0x000900000002316c-193.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 2920 定制版.exe 2920 定制版.exe 2920 定制版.exe 2920 定制版.exe -
resource yara_rule behavioral2/memory/2920-134-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-133-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-135-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-136-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-138-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-140-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-142-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-144-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-146-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-148-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-150-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-152-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-154-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-156-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-158-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-160-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-162-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-164-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-166-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-168-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-170-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-172-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-174-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-176-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2920-177-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/files/0x000900000002316c-189.dat upx behavioral2/files/0x000900000002316c-191.dat upx behavioral2/files/0x000900000002316c-193.dat upx behavioral2/memory/2920-194-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx behavioral2/memory/2920-195-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx behavioral2/memory/2920-201-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx behavioral2/memory/2920-204-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx behavioral2/memory/2920-419-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx behavioral2/memory/2920-438-0x0000000004BC0000-0x00000000050A2000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 定制版.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\windows Find2\DmReg.dll 定制版.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2920 定制版.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2920 定制版.exe 2920 定制版.exe 2920 定制版.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5fdc8b75a37017141831e3421479307be
SHA1f6a08cc570d5e5bc4218da376ca353d46d62790d
SHA2562a37ce301490bd4b7c5d02b768b054705fe4620db6ef81061718c1fe89c9f27e
SHA512d74e2de28523317c928965affa464cef6ba5c4da9ab05d30a79a4d3bbb59284d68331b5735c705cf73e155cf3a42b01ef5cd7219c72c242eed6b711090066537
-
Filesize
52KB
MD5fdc8b75a37017141831e3421479307be
SHA1f6a08cc570d5e5bc4218da376ca353d46d62790d
SHA2562a37ce301490bd4b7c5d02b768b054705fe4620db6ef81061718c1fe89c9f27e
SHA512d74e2de28523317c928965affa464cef6ba5c4da9ab05d30a79a4d3bbb59284d68331b5735c705cf73e155cf3a42b01ef5cd7219c72c242eed6b711090066537
-
Filesize
51B
MD5db40a2f52e6254c0cc3f8fe9870984d3
SHA1747d27f736a3f85d9a64642f5f444fd78a7b314d
SHA2561bae6806ddef5b2aef8cda73b4a1d0f35cb7bd3a3e234aa140e0cb6c0ecfcb80
SHA5129cd92839f23600e183e416d783898c69ba1251b3b297a2b36ec193e6eb56ead634664d9b202ee5e3d4bfd42f896e64e158f5802257ff22b5d33117d17117145d
-
Filesize
3.6MB
MD5434ae2cc38a273b4068cbd59b2596009
SHA164e7ba77119c34280d04554d71c7c467c201bfc4
SHA256a3487289da617e34a779866c9117e7da7f7799356ad6e5394405a55d20258dc2
SHA512818c8ae6bee43ac5c4f6d33d1d21ac3bd7a7133aafb25c0f793129706273138051ba847da90a033dcfbfda08c44d22efd2923b277da377883792fc69de95ca90
-
Filesize
3.6MB
MD5434ae2cc38a273b4068cbd59b2596009
SHA164e7ba77119c34280d04554d71c7c467c201bfc4
SHA256a3487289da617e34a779866c9117e7da7f7799356ad6e5394405a55d20258dc2
SHA512818c8ae6bee43ac5c4f6d33d1d21ac3bd7a7133aafb25c0f793129706273138051ba847da90a033dcfbfda08c44d22efd2923b277da377883792fc69de95ca90
-
Filesize
3.6MB
MD5434ae2cc38a273b4068cbd59b2596009
SHA164e7ba77119c34280d04554d71c7c467c201bfc4
SHA256a3487289da617e34a779866c9117e7da7f7799356ad6e5394405a55d20258dc2
SHA512818c8ae6bee43ac5c4f6d33d1d21ac3bd7a7133aafb25c0f793129706273138051ba847da90a033dcfbfda08c44d22efd2923b277da377883792fc69de95ca90