Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 21:14
Behavioral task
behavioral1
Sample
6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe
Resource
win10v2004-20230915-en
General
-
Target
6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe
-
Size
11.4MB
-
MD5
f4f1ce89290bfbbb2c197220c43a73ef
-
SHA1
95deb52f56530789d21ae1ff20d274f08d3664c2
-
SHA256
6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030
-
SHA512
5119120953599a7ef74797abec37caaa2bdf8e50f9c8b14729bb500e8d6ac736f5bb84711fa2f174c7eefbb1f5ffd1f874c86823a84edfcbd1a62c2045ab6d8d
-
SSDEEP
196608:TTuhaBNqPjPJ/MbqnbjTtdThFG5bE4TCliXsE8GvVI+XTjf6s2pHhFZr3QPoiuNv:TTSINqPx4qXDTS5E4T0HE/K+H6s2JPBY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 6 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000900000002319e-17.dat acprotect behavioral2/files/0x00070000000231a3-21.dat acprotect behavioral2/files/0x00070000000231a2-23.dat acprotect behavioral2/files/0x00070000000231a4-25.dat acprotect behavioral2/files/0x000800000002319f-29.dat acprotect behavioral2/files/0x000800000002319f-27.dat acprotect -
Loads dropped DLL 7 IoCs
pid Process 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe -
resource yara_rule behavioral2/memory/2484-0-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-1-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-6-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/files/0x000900000002319e-17.dat upx behavioral2/memory/2484-20-0x0000000072EC0000-0x00000000735F4000-memory.dmp upx behavioral2/files/0x00070000000231a3-21.dat upx behavioral2/files/0x00070000000231a2-23.dat upx behavioral2/files/0x00070000000231a4-25.dat upx behavioral2/files/0x000800000002319f-29.dat upx behavioral2/files/0x000800000002319f-27.dat upx behavioral2/memory/2484-36-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/2484-37-0x000000006CF00000-0x000000006CF58000-memory.dmp upx behavioral2/memory/2484-38-0x0000000006C30000-0x0000000006CA9000-memory.dmp upx behavioral2/memory/2484-39-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral2/memory/2484-40-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-41-0x0000000072EC0000-0x00000000735F4000-memory.dmp upx behavioral2/memory/2484-42-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/2484-46-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-52-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-58-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-64-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-70-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-76-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-82-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-88-0x0000000000400000-0x000000000149E000-memory.dmp upx behavioral2/memory/2484-94-0x0000000000400000-0x000000000149E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeLockMemoryPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: SeIncBasePriorityPrivilege 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe Token: 33 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe 2484 6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe"C:\Users\Admin\AppData\Local\Temp\6c11b0ad8c79872ab0cae5ee3db79faa1f113e09d0f17e82ab9492563c1b6030.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD5a474404b5bb6bb2e862302691fdbc6a9
SHA1a7cbea26dfab4e47793d819fe77e0c722b698dce
SHA25676269894668b55fdc052884ed9a5e4f1dfdb6c560cbbae750b2126dedfff0345
SHA512caabe657d987329e2c2f1dabe4e334f56f5110d88f5093033172b949418fab6b3a5d52b497389d1c2aa9393ba2614f3343c80dfe14516051739833cb7bdfafab
-
Filesize
1.5MB
MD5ad025d607c79bfe1635136b2e879886a
SHA1136bed91251f38ab9607028b13b929b2b6eb9306
SHA25658f92e5df2db5cd4be6bff3b5a2bab139927a475d864974ab84a120685b31c50
SHA51208221ceafa411305d03405db0eb9cd76c477629124b25182daa20b36975fe6a14e49db5bb604b93ced717c75d1a0f070a997869f97b3b08932278cac98209fc7
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
254KB
MD56b82dbdf29f34ab683c7525ea316f6fd
SHA1f7232170d14ac3a6544540f7070b824ef6cd354e
SHA256711552fc86675a863463fed2f75051c1d90f447e0d59e131b08b48e288c3ec09
SHA512d21a112ad3d757e96fb49491cc11c09f9ea472ebc5af9e3b0561fec363acb1995eb2d040f6d6bf940bb6fd601b15f271332f8d719583458432f67ed264c406d9
-
Filesize
5.1MB
MD5b159bba22ed8faee5160ea3e22915dfe
SHA15bc9f90499946050cb560e1d8269ec8ac39dc46c
SHA2563f1eac898b79aed797b8648c6cbf3371ea5525db64fb830bf1fc4da1454eed92
SHA512cef9452f84fe1e30b478e3dfd50fc936ed1aae58e245770b7d3a31dc5ac6f52d54c1c55d61307b64f52efb798da8dcd5246de3cf31281035f72e64a19321f731
-
Filesize
129KB
MD55814d46195be3983e963e13a91657e7a
SHA1ebbfe9956111522918ce7b9f6bd80a3cb79bc330
SHA2568de1e1aeec7490e7ff4a7f8f7617ed6b166e55f694d79aced37c7634b6da4cd9
SHA51299d9c14fefd32d7a665adc2824bf600e43b6a572f27dc88ffb487bb3ac049309cf2b04279f2b3a63290f567a47e99bf6f25db0bda96c1ec80241ceb3fa22cb1d