Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 00:09

General

  • Target

    c82e6ba4402a6a53bb7f50b3fa1aaa393e664041a273f320d668e8c434431e7a.exe

  • Size

    1.4MB

  • MD5

    612e1743d65d418e8ffc964b7f97db4c

  • SHA1

    392d8cca71de78fd64e485b5f468d178d14d299e

  • SHA256

    c82e6ba4402a6a53bb7f50b3fa1aaa393e664041a273f320d668e8c434431e7a

  • SHA512

    b428e7ab3d7a79a330f7612404e536cd95d1a7c8a813a88a23dbc3b49bb0cd253cc97ed38ec7b37832923861db2e6624b66a776a9d8081df4db67c5999dcedf9

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82e6ba4402a6a53bb7f50b3fa1aaa393e664041a273f320d668e8c434431e7a.exe
    "C:\Users\Admin\AppData\Local\Temp\c82e6ba4402a6a53bb7f50b3fa1aaa393e664041a273f320d668e8c434431e7a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:2904
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2124
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2580
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1824
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1408
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2848
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2928

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\ratt.7z

            Filesize

            693KB

            MD5

            7de6fdf3629c73bf0c29a96fa23ae055

            SHA1

            dcb37f6d43977601c6460b17387a89b9e4c0609a

            SHA256

            069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

            SHA512

            d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

          • C:\Users\Admin\AppData\Local\Temp\ratt.bat

            Filesize

            1KB

            MD5

            7ea1fec84d76294d9256ae3dca7676b2

            SHA1

            1e335451d1cbb6951bc77bf75430f4d983491342

            SHA256

            9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

            SHA512

            ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

          • C:\Users\Admin\AppData\Local\Temp\ratt.bat

            Filesize

            1KB

            MD5

            7ea1fec84d76294d9256ae3dca7676b2

            SHA1

            1e335451d1cbb6951bc77bf75430f4d983491342

            SHA256

            9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

            SHA512

            ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

          • C:\Users\Admin\AppData\Local\Temp\ratt.exe

            Filesize

            745.1MB

            MD5

            be788bb3680cf3809d9678ee6f7ba321

            SHA1

            499f01d5f654f83e172004dcc03f99abdd251734

            SHA256

            03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

            SHA512

            83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AHIWHQJDLQJIYB8O5XWY.temp

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            d38c62d2a5ad788c93885ca19119e06a

            SHA1

            591430fdc02ef3145ba540cb558b2d8c12b66c93

            SHA256

            0a88b838054fafe718957248fcea0ab541f82746e6efdd8dce24e00e3b196da5

            SHA512

            e9511b932ae32679bdb063437ad44376aee93fc028f1b6f0600b437298453422d6228dd8a8058c5a3298660d78f20851cd3e760e560b6ca4aeed03bc0e3cff1d

          • \Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • \Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • \Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • memory/1408-65-0x00000000025C0000-0x0000000002600000-memory.dmp

            Filesize

            256KB

          • memory/1408-66-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB

          • memory/1408-64-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB

          • memory/1408-63-0x00000000025C0000-0x0000000002600000-memory.dmp

            Filesize

            256KB

          • memory/1408-62-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB

          • memory/1720-39-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/1720-38-0x0000000002670000-0x00000000026B0000-memory.dmp

            Filesize

            256KB

          • memory/1720-37-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/1720-36-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/1824-55-0x0000000002550000-0x0000000002590000-memory.dmp

            Filesize

            256KB

          • memory/1824-54-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/1824-53-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/1824-56-0x0000000074630000-0x0000000074BDB000-memory.dmp

            Filesize

            5.7MB

          • memory/2580-30-0x0000000074670000-0x0000000074C1B000-memory.dmp

            Filesize

            5.7MB

          • memory/2580-26-0x0000000074670000-0x0000000074C1B000-memory.dmp

            Filesize

            5.7MB

          • memory/2580-28-0x0000000002720000-0x0000000002760000-memory.dmp

            Filesize

            256KB

          • memory/2580-27-0x0000000074670000-0x0000000074C1B000-memory.dmp

            Filesize

            5.7MB

          • memory/2580-29-0x0000000002720000-0x0000000002760000-memory.dmp

            Filesize

            256KB

          • memory/2756-77-0x00000000001F0000-0x0000000000222000-memory.dmp

            Filesize

            200KB

          • memory/2756-69-0x00000000001F0000-0x0000000000222000-memory.dmp

            Filesize

            200KB

          • memory/2756-71-0x00000000001F0000-0x0000000000222000-memory.dmp

            Filesize

            200KB

          • memory/2756-78-0x00000000001F0000-0x0000000000222000-memory.dmp

            Filesize

            200KB

          • memory/2848-92-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2848-75-0x0000000010000000-0x00000000100E2000-memory.dmp

            Filesize

            904KB

          • memory/2848-79-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2848-81-0x0000000010000000-0x00000000100E2000-memory.dmp

            Filesize

            904KB

          • memory/2928-103-0x0000000074650000-0x0000000074BFB000-memory.dmp

            Filesize

            5.7MB

          • memory/2928-101-0x0000000074650000-0x0000000074BFB000-memory.dmp

            Filesize

            5.7MB

          • memory/2928-102-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2928-104-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2928-105-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2928-106-0x0000000074650000-0x0000000074BFB000-memory.dmp

            Filesize

            5.7MB

          • memory/2928-108-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2928-107-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2928-109-0x0000000000360000-0x00000000003A0000-memory.dmp

            Filesize

            256KB

          • memory/2980-46-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB

          • memory/2980-47-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB

          • memory/2980-45-0x0000000074640000-0x0000000074BEB000-memory.dmp

            Filesize

            5.7MB