Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Resource
win10v2004-20230915-en
General
-
Target
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
-
Size
9.5MB
-
MD5
750b012712b7e01a74cc38f0a6e2adf3
-
SHA1
f85f5e34b9be6ff09f9e99edf771891ea52d7e81
-
SHA256
ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92
-
SHA512
b42ea5632c218c9afe52f34f00c2f50cdbf02c1bac3dabd7278eefef9be6b3e99844cf2135f0c39c18e37186c68733af3b8d4a0ba46409519ada7bf60ef62ccb
-
SSDEEP
98304:DpwYtqomlBJoaqigBi6D9Omp8Hhbr+hrD1d76TQFkaXWocsamjoZ4ACgmPZg6rdU:VwY5GOFiY9jy0vFeoxvDGSZtdy/KgSY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00060000000231c3-56.dat acprotect behavioral2/files/0x00060000000231c3-54.dat acprotect behavioral2/files/0x00060000000231c3-64.dat acprotect behavioral2/files/0x00060000000231c3-69.dat acprotect behavioral2/files/0x00060000000231c3-67.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
resource yara_rule behavioral2/memory/4560-6-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-9-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-10-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-8-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-11-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-12-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-14-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-16-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-18-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-20-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-22-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-24-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-26-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-28-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-30-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-32-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-34-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-36-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-38-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-40-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-42-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-44-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-46-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-48-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-50-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/memory/4560-52-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/files/0x00060000000231c3-56.dat upx behavioral2/files/0x00060000000231c3-54.dat upx behavioral2/memory/4560-58-0x0000000004BD0000-0x00000000050F1000-memory.dmp upx behavioral2/memory/4560-60-0x0000000002DE0000-0x0000000002E1E000-memory.dmp upx behavioral2/files/0x00060000000231c3-64.dat upx behavioral2/files/0x00060000000231c3-69.dat upx behavioral2/files/0x00060000000231c3-67.dat upx behavioral2/memory/4560-72-0x0000000004BD0000-0x00000000050F1000-memory.dmp upx behavioral2/memory/4560-73-0x0000000004BD0000-0x00000000050F1000-memory.dmp upx behavioral2/memory/4560-90-0x0000000004BD0000-0x00000000050F1000-memory.dmp upx behavioral2/memory/4560-97-0x0000000004BD0000-0x00000000050F1000-memory.dmp upx -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS\ = "0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ThreadingModel = "Both" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\ = "dm" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID\ = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer\ = "dm.dmsoft" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR\ ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe 4560 ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe"C:\Users\Admin\AppData\Local\Temp\ceb97f39b0e1e9b4d50f9bc3f2b2e9182f080c2483239318af495ea2c0644c92.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4560
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64
-
Filesize
3.4MB
MD5abc3005e3131e02c26e60142ee1ae517
SHA188d581e11ea74f7cf4faa559d1410bd29b254bba
SHA256aa37c80dd3348d5d8578469663f605329591bd740101a4783c63467cc49cfaf2
SHA5128fc505e0e282ec3be027ed48996421e242f68bebea5dc9f5b07cc28c66a9dbccd2264b32b558341113f30faf3553874cb7da1a80c7909d6f8aa0fb7ea24d2c64