Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Resource
win10v2004-20230915-en
General
-
Target
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
-
Size
9.5MB
-
MD5
750b012712b7e01a74cc38f0a6e2adf3
-
SHA1
f85f5e34b9be6ff09f9e99edf771891ea52d7e81
-
SHA256
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92
-
SHA512
b42ea5632c218c9afe52f34f00c2f50cdbf02c1bac3dabd7278eefef9be6b3e99844cf2135f0c39c18e37186c68733af3b8d4a0ba46409519ada7bf60ef62ccb
-
SSDEEP
98304:DpwYtqomlBJoaqigBi6D9Omp8Hhbr+hrD1d76TQFkaXWocsamjoZ4ACgmPZg6rdU:VwY5GOFiY9jy0vFeoxvDGSZtdy/KgSY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0023000000015eab-53.dat acprotect behavioral1/files/0x0023000000015eab-63.dat acprotect behavioral1/files/0x0023000000015eab-64.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
resource yara_rule behavioral1/memory/868-6-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-9-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-8-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-10-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-11-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-13-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-15-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-17-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-19-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-21-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-23-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-25-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-27-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-29-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-31-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-33-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-35-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-37-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-39-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-41-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-43-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-45-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-47-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-49-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/memory/868-51-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/files/0x0023000000015eab-53.dat upx behavioral1/memory/868-55-0x0000000003E00000-0x0000000004321000-memory.dmp upx behavioral1/memory/868-56-0x0000000000E60000-0x0000000000E9E000-memory.dmp upx behavioral1/files/0x0023000000015eab-63.dat upx behavioral1/files/0x0023000000015eab-64.dat upx behavioral1/memory/868-65-0x0000000003E00000-0x0000000004321000-memory.dmp upx behavioral1/memory/868-77-0x0000000003E00000-0x0000000004321000-memory.dmp upx behavioral1/memory/868-79-0x0000000003E00000-0x0000000004321000-memory.dmp upx behavioral1/memory/868-87-0x0000000003E00000-0x0000000004321000-memory.dmp upx behavioral1/memory/868-94-0x0000000003E00000-0x0000000004321000-memory.dmp upx -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\ = "dm" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR\ ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ThreadingModel = "Both" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID\ = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS\ = "0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 868 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe"C:\Users\Admin\AppData\Local\Temp\ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:868
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64