Analysis

  • max time kernel
    166s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 23:22

General

  • Target

    d66aee767bf559526ff40b1deea290e204cb2d926d8619d64cd4d76094b06759.exe

  • Size

    1.4MB

  • MD5

    b7ef165c6d5ee14550c77ffde5a2999c

  • SHA1

    69333ad68693109321097d7285cf42fbc0b48480

  • SHA256

    d66aee767bf559526ff40b1deea290e204cb2d926d8619d64cd4d76094b06759

  • SHA512

    0f1c59c9b5030fd0a5b23a317ada28d243249f4ceccaf1199eec5c42f5d27ed1ff814d54c2d5a06eab03d1fc9e02d5e4b4e42e4e5a47fe22f988e90a8a76f77e

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d66aee767bf559526ff40b1deea290e204cb2d926d8619d64cd4d76094b06759.exe
    "C:\Users\Admin\AppData\Local\Temp\d66aee767bf559526ff40b1deea290e204cb2d926d8619d64cd4d76094b06759.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:3032
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2536
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2272
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1668
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2840
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:312
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2068
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
            PID:1504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7z.dll

        Filesize

        328KB

        MD5

        15bbbe562f9be3e5dcbb834e635cc231

        SHA1

        7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

        SHA256

        ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

        SHA512

        769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

      • C:\Users\Admin\AppData\Local\Temp\7z.exe

        Filesize

        71KB

        MD5

        8ba2e41b330ae9356e62eb63514cf82e

        SHA1

        8dc266467a5a0d587ed0181d4344581ef4ff30b2

        SHA256

        ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

        SHA512

        2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

      • C:\Users\Admin\AppData\Local\Temp\7z.exe

        Filesize

        71KB

        MD5

        8ba2e41b330ae9356e62eb63514cf82e

        SHA1

        8dc266467a5a0d587ed0181d4344581ef4ff30b2

        SHA256

        ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

        SHA512

        2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

      • C:\Users\Admin\AppData\Local\Temp\ratt.7z

        Filesize

        693KB

        MD5

        7de6fdf3629c73bf0c29a96fa23ae055

        SHA1

        dcb37f6d43977601c6460b17387a89b9e4c0609a

        SHA256

        069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

        SHA512

        d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

      • C:\Users\Admin\AppData\Local\Temp\ratt.bat

        Filesize

        1KB

        MD5

        7ea1fec84d76294d9256ae3dca7676b2

        SHA1

        1e335451d1cbb6951bc77bf75430f4d983491342

        SHA256

        9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

        SHA512

        ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

      • C:\Users\Admin\AppData\Local\Temp\ratt.bat

        Filesize

        1KB

        MD5

        7ea1fec84d76294d9256ae3dca7676b2

        SHA1

        1e335451d1cbb6951bc77bf75430f4d983491342

        SHA256

        9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

        SHA512

        ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

      • C:\Users\Admin\AppData\Local\Temp\ratt.exe

        Filesize

        745.1MB

        MD5

        be788bb3680cf3809d9678ee6f7ba321

        SHA1

        499f01d5f654f83e172004dcc03f99abdd251734

        SHA256

        03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

        SHA512

        83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1C7H2RW3NB8HBHBDKU62.temp

        Filesize

        7KB

        MD5

        deb558d3111135a54209ff59cc93d819

        SHA1

        a06e1b07cc9c73d5c91b8b35af4b18de41b4b5e1

        SHA256

        be8c87ae2a74b8706b807ce96e869d24e31cb54e8577ded612c78cb70f37789f

        SHA512

        eec66ea32abeca8a9e106a4ffcaab854d75e6ef2e9d4175c2dd72eb1fab3b4088250092ea1381d19ac90d5d6bdd157b51d4ea16158d5b5c347e8c7e4927857d4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        deb558d3111135a54209ff59cc93d819

        SHA1

        a06e1b07cc9c73d5c91b8b35af4b18de41b4b5e1

        SHA256

        be8c87ae2a74b8706b807ce96e869d24e31cb54e8577ded612c78cb70f37789f

        SHA512

        eec66ea32abeca8a9e106a4ffcaab854d75e6ef2e9d4175c2dd72eb1fab3b4088250092ea1381d19ac90d5d6bdd157b51d4ea16158d5b5c347e8c7e4927857d4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        deb558d3111135a54209ff59cc93d819

        SHA1

        a06e1b07cc9c73d5c91b8b35af4b18de41b4b5e1

        SHA256

        be8c87ae2a74b8706b807ce96e869d24e31cb54e8577ded612c78cb70f37789f

        SHA512

        eec66ea32abeca8a9e106a4ffcaab854d75e6ef2e9d4175c2dd72eb1fab3b4088250092ea1381d19ac90d5d6bdd157b51d4ea16158d5b5c347e8c7e4927857d4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        59f913c2e94f48e8a2b0fbfe436f541b

        SHA1

        ee2487bdfc147b7317318af5d49f61365567798b

        SHA256

        1876dc6e5deb2d3b4f4cd7221b16d1f5297d0244f0a70eac6d0307df997b7e5b

        SHA512

        6165cce712585ec5b36df288399bf19191d02ff9a3a5ec3b553d63d4790ada83115cdcaebd72348a4846eb31a162b25f527aa05a10e61df2301d8a2e86c249a4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        deb558d3111135a54209ff59cc93d819

        SHA1

        a06e1b07cc9c73d5c91b8b35af4b18de41b4b5e1

        SHA256

        be8c87ae2a74b8706b807ce96e869d24e31cb54e8577ded612c78cb70f37789f

        SHA512

        eec66ea32abeca8a9e106a4ffcaab854d75e6ef2e9d4175c2dd72eb1fab3b4088250092ea1381d19ac90d5d6bdd157b51d4ea16158d5b5c347e8c7e4927857d4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        deb558d3111135a54209ff59cc93d819

        SHA1

        a06e1b07cc9c73d5c91b8b35af4b18de41b4b5e1

        SHA256

        be8c87ae2a74b8706b807ce96e869d24e31cb54e8577ded612c78cb70f37789f

        SHA512

        eec66ea32abeca8a9e106a4ffcaab854d75e6ef2e9d4175c2dd72eb1fab3b4088250092ea1381d19ac90d5d6bdd157b51d4ea16158d5b5c347e8c7e4927857d4

      • \Users\Admin\AppData\Local\Temp\7z.dll

        Filesize

        328KB

        MD5

        15bbbe562f9be3e5dcbb834e635cc231

        SHA1

        7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

        SHA256

        ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

        SHA512

        769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

      • \Users\Admin\AppData\Local\Temp\7z.exe

        Filesize

        71KB

        MD5

        8ba2e41b330ae9356e62eb63514cf82e

        SHA1

        8dc266467a5a0d587ed0181d4344581ef4ff30b2

        SHA256

        ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

        SHA512

        2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

      • \Users\Admin\AppData\Local\Temp\7z.exe

        Filesize

        71KB

        MD5

        8ba2e41b330ae9356e62eb63514cf82e

        SHA1

        8dc266467a5a0d587ed0181d4344581ef4ff30b2

        SHA256

        ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

        SHA512

        2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

      • memory/312-70-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/312-71-0x00000000027B0000-0x00000000027F0000-memory.dmp

        Filesize

        256KB

      • memory/312-69-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/312-73-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/312-72-0x00000000027B0000-0x00000000027F0000-memory.dmp

        Filesize

        256KB

      • memory/1504-110-0x0000000002430000-0x0000000002470000-memory.dmp

        Filesize

        256KB

      • memory/1504-109-0x0000000002430000-0x0000000002470000-memory.dmp

        Filesize

        256KB

      • memory/1504-108-0x0000000073FA0000-0x000000007454B000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-50-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-51-0x0000000002430000-0x0000000002470000-memory.dmp

        Filesize

        256KB

      • memory/1668-52-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-49-0x0000000073F40000-0x00000000744EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-29-0x00000000025B0000-0x00000000025F0000-memory.dmp

        Filesize

        256KB

      • memory/1700-28-0x00000000025B0000-0x00000000025F0000-memory.dmp

        Filesize

        256KB

      • memory/1700-26-0x0000000074240000-0x00000000747EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-31-0x0000000074240000-0x00000000747EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-27-0x0000000074240000-0x00000000747EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-30-0x0000000074240000-0x00000000747EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-33-0x0000000074240000-0x00000000747EB000-memory.dmp

        Filesize

        5.7MB

      • memory/1700-32-0x00000000025B0000-0x00000000025F0000-memory.dmp

        Filesize

        256KB

      • memory/2068-99-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/2068-82-0x0000000010000000-0x00000000100E2000-memory.dmp

        Filesize

        904KB

      • memory/2068-86-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/2068-88-0x0000000010000000-0x00000000100E2000-memory.dmp

        Filesize

        904KB

      • memory/2272-42-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB

      • memory/2272-39-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB

      • memory/2272-41-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB

      • memory/2272-40-0x0000000001F80000-0x0000000001FC0000-memory.dmp

        Filesize

        256KB

      • memory/2532-78-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/2532-85-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/2532-84-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/2532-76-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/2840-62-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB

      • memory/2840-61-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB

      • memory/2840-60-0x00000000021D0000-0x0000000002210000-memory.dmp

        Filesize

        256KB

      • memory/2840-59-0x00000000021D0000-0x0000000002210000-memory.dmp

        Filesize

        256KB

      • memory/2840-58-0x0000000073F70000-0x000000007451B000-memory.dmp

        Filesize

        5.7MB