Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe
Resource
win10v2004-20230703-en
General
-
Target
bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe
-
Size
12.2MB
-
MD5
25a4df1db9736d99cdd5deea5fdbd1b2
-
SHA1
b20b5b250ffb2d07e6a7628311d2595b2817070f
-
SHA256
bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55
-
SHA512
44c106b2cb242fa3dfcd3527e6888456dbfb53912134544f5fefbf97a460cb8259b2519e1a119ff3585c3d1d70e7463f3c767794639829be8ea1ecac1478f890
-
SSDEEP
196608:5BREyceaUzv9EW/A7FzOvIJG1J7sK1kX0n4JVRc9BDalV:hEyNlzvaW/A7lKPu0n4Bc9sj
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000231e9-6.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe -
resource yara_rule behavioral2/files/0x00070000000231e9-6.dat upx behavioral2/memory/4908-9-0x0000000073720000-0x00000000743E8000-memory.dmp upx behavioral2/memory/4908-11-0x0000000073720000-0x00000000743E8000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4572 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 82 PID 4908 wrote to memory of 4572 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 82 PID 4908 wrote to memory of 4572 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 82 PID 4908 wrote to memory of 864 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 84 PID 4908 wrote to memory of 864 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 84 PID 4908 wrote to memory of 864 4908 bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe"C:\Users\Admin\AppData\Local\Temp\bc020bb098cdc806d3fa6e6906e96cbba22ae6dd6242257bf7d45299ada6ad55.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\netsh.exenetsh int ipv4 set dynamicport tcp start=10000 num=550002⤵PID:4572
-
-
C:\Windows\SysWOW64\netsh.exenetsh int ipv6 set dynamicport tcp start=10000 num=550002⤵PID:864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
Filesize
4.1MB
MD594d3a3c4309ee3cac460fb1295f55958
SHA15f7d35823351c89e6497535d1cf2990e58d4ef0a
SHA256555c40e0548b4e513c975a1e110fe1092ce88ec75080e1d4a325ceea54055f36
SHA51296a8f3504e330d71cc024171207505212380e32b6477200d27212fc32901145416cede47e7ce603bd6d92b624186de0bc1e280af10ec3ca6b6eb465183a5e522