Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 11:49

General

  • Target

    1b162c8d9a91f67a861bf9b260a60ab5de76f22d4d4f1ecdf0abfdb7a665f3f3.exe

  • Size

    2.1MB

  • MD5

    43b4c2deee17bfcb35a1f92f8a25f13a

  • SHA1

    e9e1ad3965ce7cb43ab010566d3b4220962f5aac

  • SHA256

    1b162c8d9a91f67a861bf9b260a60ab5de76f22d4d4f1ecdf0abfdb7a665f3f3

  • SHA512

    a72e05647f37bf4dbf93453698383b0f4001b322856e48b9ab679c91ca9b76c75580865e90090ee741e30cce0ec448550d1c78ce1a03e40258f8ec78894b0fe7

  • SSDEEP

    49152:h70zUOQicWYgLB713lG4lzDVKzD+s8KuqGaX0ToIBAUZLYu:9WjLBhlG4dVG4JBAUZL1

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 6 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b162c8d9a91f67a861bf9b260a60ab5de76f22d4d4f1ecdf0abfdb7a665f3f3.exe
    "C:\Users\Admin\AppData\Local\Temp\1b162c8d9a91f67a861bf9b260a60ab5de76f22d4d4f1ecdf0abfdb7a665f3f3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\ÐÂÈÈѪ½­ºþ.exe
      C:\Users\Admin\AppData\Local\Temp\ÐÂÈÈѪ½­ºþ.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 C:\Users\Admin\AppData\Local\Temp\dm.dll /u
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:672
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 C:\Users\Admin\AppData\Local\Temp\dm.dll /s
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:2780
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\regdm.bat /s
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 dm.dll
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Skin.dll

    Filesize

    86KB

    MD5

    114054313070472cd1a6d7d28f7c5002

    SHA1

    9a044986e6101df1a126035da7326a50c3fe9a23

    SHA256

    e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

    SHA512

    a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

  • C:\Users\Admin\AppData\Local\Temp\Skin.dll

    Filesize

    86KB

    MD5

    114054313070472cd1a6d7d28f7c5002

    SHA1

    9a044986e6101df1a126035da7326a50c3fe9a23

    SHA256

    e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

    SHA512

    a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

  • C:\Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.6MB

    MD5

    62c647f6852ee71d228b45c5523be206

    SHA1

    12a3a85883caa09b94413a22cf03c4115ca90bda

    SHA256

    3015276c93793273b01cf9e610ef2069edd07e8ad5002cd231234aa3a4088bfd

    SHA512

    11ce3d5486b5f46df47a0d336048f8e10b85f1e8c257ca95135a1512842ecec886cc5d2dbb36abb5b303d1811159aa8c604ef69f3e2a23d3fb483e813b631a54

  • C:\Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.6MB

    MD5

    62c647f6852ee71d228b45c5523be206

    SHA1

    12a3a85883caa09b94413a22cf03c4115ca90bda

    SHA256

    3015276c93793273b01cf9e610ef2069edd07e8ad5002cd231234aa3a4088bfd

    SHA512

    11ce3d5486b5f46df47a0d336048f8e10b85f1e8c257ca95135a1512842ecec886cc5d2dbb36abb5b303d1811159aa8c604ef69f3e2a23d3fb483e813b631a54

  • C:\Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.6MB

    MD5

    62c647f6852ee71d228b45c5523be206

    SHA1

    12a3a85883caa09b94413a22cf03c4115ca90bda

    SHA256

    3015276c93793273b01cf9e610ef2069edd07e8ad5002cd231234aa3a4088bfd

    SHA512

    11ce3d5486b5f46df47a0d336048f8e10b85f1e8c257ca95135a1512842ecec886cc5d2dbb36abb5b303d1811159aa8c604ef69f3e2a23d3fb483e813b631a54

  • C:\Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.6MB

    MD5

    62c647f6852ee71d228b45c5523be206

    SHA1

    12a3a85883caa09b94413a22cf03c4115ca90bda

    SHA256

    3015276c93793273b01cf9e610ef2069edd07e8ad5002cd231234aa3a4088bfd

    SHA512

    11ce3d5486b5f46df47a0d336048f8e10b85f1e8c257ca95135a1512842ecec886cc5d2dbb36abb5b303d1811159aa8c604ef69f3e2a23d3fb483e813b631a54

  • C:\Users\Admin\AppData\Local\Temp\regdm.bat

    Filesize

    153B

    MD5

    d99772d5b382760de3f57e4747beb2e7

    SHA1

    5394a2ed1ea44c64d372421aa7e320a048b0fa7e

    SHA256

    eb0e007495cffe56be7573c96c1e5934e9ba556cc6fb372b9e9d78cb1509707a

    SHA512

    9a385ba43e050c3bf97f1ee78fb2649d4cac0bd1f3700c3be343ec1dc3e38616d7288e2eabaea4c0b4bd14f517889857dcc5ad5c41161352ecac22ddd1e4bfe6

  • C:\Users\Admin\AppData\Local\Temp\ÐÂÈÈѪ½­ºþ.exe

    Filesize

    7.9MB

    MD5

    d6e9e8a92deb07f3f9dc9463fbd38621

    SHA1

    985c5ebe89498ebfcf284fcf00b39057cc692c45

    SHA256

    2a994096feb45c2ca361fa9d870676556d62185e921e906ae55cc7551d4599a3

    SHA512

    ffeed5f4167ea5a301cdf945788f07d4dfd184aeacebcdc02e3546ddccd570896dfed942754503df6214f0c4b5fef157ce882f69a73a01e2b27fb891d21f1a64

  • C:\Users\Admin\AppData\Local\Temp\ÐÂÈÈѪ½­ºþ.exe

    Filesize

    7.9MB

    MD5

    d6e9e8a92deb07f3f9dc9463fbd38621

    SHA1

    985c5ebe89498ebfcf284fcf00b39057cc692c45

    SHA256

    2a994096feb45c2ca361fa9d870676556d62185e921e906ae55cc7551d4599a3

    SHA512

    ffeed5f4167ea5a301cdf945788f07d4dfd184aeacebcdc02e3546ddccd570896dfed942754503df6214f0c4b5fef157ce882f69a73a01e2b27fb891d21f1a64

  • memory/500-1590-0x00000000022D0000-0x00000000022E6000-memory.dmp

    Filesize

    88KB

  • memory/500-1587-0x0000000002330000-0x0000000002B4B000-memory.dmp

    Filesize

    8.1MB

  • memory/500-1588-0x0000000002B50000-0x000000000344A000-memory.dmp

    Filesize

    9.0MB

  • memory/500-1577-0x0000000010000000-0x00000000104E2000-memory.dmp

    Filesize

    4.9MB

  • memory/500-1589-0x00000000022F0000-0x00000000022F2000-memory.dmp

    Filesize

    8KB

  • memory/500-1592-0x0000000010000000-0x00000000104E2000-memory.dmp

    Filesize

    4.9MB

  • memory/500-1593-0x0000000002B50000-0x000000000344A000-memory.dmp

    Filesize

    9.0MB

  • memory/500-1594-0x00000000022D0000-0x00000000022E6000-memory.dmp

    Filesize

    88KB

  • memory/672-1585-0x0000000010000000-0x00000000104E2000-memory.dmp

    Filesize

    4.9MB

  • memory/672-1578-0x0000000010000000-0x00000000104E2000-memory.dmp

    Filesize

    4.9MB

  • memory/672-1597-0x0000000003F50000-0x0000000003F66000-memory.dmp

    Filesize

    88KB

  • memory/672-1596-0x0000000003650000-0x0000000003F4A000-memory.dmp

    Filesize

    9.0MB

  • memory/672-1591-0x0000000003650000-0x0000000003F4A000-memory.dmp

    Filesize

    9.0MB

  • memory/672-1569-0x0000000010000000-0x00000000104E2000-memory.dmp

    Filesize

    4.9MB

  • memory/672-1586-0x0000000002D60000-0x000000000357B000-memory.dmp

    Filesize

    8.1MB

  • memory/672-1571-0x0000000002D60000-0x000000000357B000-memory.dmp

    Filesize

    8.1MB

  • memory/672-1583-0x0000000003F70000-0x0000000003F72000-memory.dmp

    Filesize

    8KB

  • memory/672-1581-0x0000000003F50000-0x0000000003F66000-memory.dmp

    Filesize

    88KB

  • memory/672-1579-0x0000000003650000-0x0000000003F4A000-memory.dmp

    Filesize

    9.0MB

  • memory/2780-1582-0x00000000035C0000-0x00000000035D6000-memory.dmp

    Filesize

    88KB

  • memory/2780-1580-0x0000000002CC0000-0x00000000035BA000-memory.dmp

    Filesize

    9.0MB

  • memory/2780-1573-0x00000000023E0000-0x0000000002BFB000-memory.dmp

    Filesize

    8.1MB

  • memory/2780-1584-0x0000000002CC0000-0x00000000035BA000-memory.dmp

    Filesize

    9.0MB

  • memory/2996-155-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2996-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2996-152-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2996-154-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2996-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4228-1560-0x0000000000400000-0x00000000015FB000-memory.dmp

    Filesize

    18.0MB

  • memory/4228-1570-0x0000000000400000-0x00000000015FB000-memory.dmp

    Filesize

    18.0MB

  • memory/4228-1554-0x0000000000400000-0x00000000015FB000-memory.dmp

    Filesize

    18.0MB

  • memory/4228-1551-0x00000000017B0000-0x00000000017B1000-memory.dmp

    Filesize

    4KB

  • memory/4228-1553-0x00000000017E0000-0x00000000017E1000-memory.dmp

    Filesize

    4KB

  • memory/4228-1557-0x0000000001C30000-0x0000000001C31000-memory.dmp

    Filesize

    4KB

  • memory/4228-1568-0x0000000000400000-0x00000000015FB000-memory.dmp

    Filesize

    18.0MB

  • memory/4228-1552-0x00000000017D0000-0x00000000017D1000-memory.dmp

    Filesize

    4KB

  • memory/4228-1556-0x0000000001C20000-0x0000000001C21000-memory.dmp

    Filesize

    4KB

  • memory/4228-1555-0x0000000001C10000-0x0000000001C11000-memory.dmp

    Filesize

    4KB

  • memory/4228-1558-0x0000000001C40000-0x0000000001C41000-memory.dmp

    Filesize

    4KB

  • memory/4228-1559-0x0000000001C50000-0x0000000001C51000-memory.dmp

    Filesize

    4KB

  • memory/4228-1600-0x0000000000400000-0x00000000015FB000-memory.dmp

    Filesize

    18.0MB