Analysis
-
max time kernel
0s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 00:09
Static task
static1
Behavioral task
behavioral1
Sample
312f8e61b64ea715d3cc42d685ac6b00.exe
Resource
win7-20231215-en
General
-
Target
312f8e61b64ea715d3cc42d685ac6b00.exe
-
Size
4.6MB
-
MD5
312f8e61b64ea715d3cc42d685ac6b00
-
SHA1
f3ae92ab4cdd0c0ae8d437dd1f5e9e86e11f33af
-
SHA256
32dad51822968a22b1a6be1150b9a60dedc106c2ee4d5c866a654972ea892d7f
-
SHA512
24140a815ea5bdda2e180625a1f0628cd26234e0b7bef4f07603c2d1c372308538338905e9b0a098296084a27150a6263da9e7644b5df83208075167b46abf3d
-
SSDEEP
98304:ilUZl606hI/0j1K+i5dkSKkADNpDn7l/qgNOCR+dp5B8sDCW:dl60XokxnkSK1pdN7+dXGsDB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral2/files/0x0006000000023232-74.dat acprotect behavioral2/files/0x0006000000023231-73.dat acprotect -
Processes:
resource yara_rule behavioral2/files/0x0006000000023230-40.dat aspack_v212_v242 behavioral2/files/0x0006000000023230-49.dat aspack_v212_v242 behavioral2/files/0x0006000000023230-57.dat aspack_v212_v242 behavioral2/files/0x0006000000023230-65.dat aspack_v212_v242 behavioral2/files/0x0008000000023226-75.dat aspack_v212_v242 behavioral2/files/0x0008000000023226-76.dat aspack_v212_v242 behavioral2/files/0x0008000000023226-77.dat aspack_v212_v242 behavioral2/files/0x0006000000023230-39.dat aspack_v212_v242 behavioral2/files/0x0008000000023226-94.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
312f8e61b64ea715d3cc42d685ac6b00.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 312f8e61b64ea715d3cc42d685ac6b00.exe -
Processes:
resource yara_rule behavioral2/files/0x0006000000023232-74.dat upx behavioral2/files/0x0006000000023231-73.dat upx -
Drops file in Program Files directory 6 IoCs
Processes:
312f8e61b64ea715d3cc42d685ac6b00.exedescription ioc Process File created C:\Program Files (x86)\System\1.bat 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System\1.bat 312f8e61b64ea715d3cc42d685ac6b00.exe File created C:\Program Files (x86)\System\test.sfx.exe 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System\test.sfx.exe 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System 312f8e61b64ea715d3cc42d685ac6b00.exe File created C:\Program Files (x86)\System\__tmp_rar_sfx_access_check_240605281 312f8e61b64ea715d3cc42d685ac6b00.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 4604 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 4508 taskkill.exe 2996 taskkill.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid Process 1736 regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\312f8e61b64ea715d3cc42d685ac6b00.exe"C:\Users\Admin\AppData\Local\Temp\312f8e61b64ea715d3cc42d685ac6b00.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\System\1.bat" "2⤵PID:772
-
C:\Program Files (x86)\System\test.sfx.exetest.sfx.exe -p123 -dC:\Program Files (x86)\System3⤵PID:3084
-
C:\Program\test.exe"C:\Program\test.exe"4⤵PID:2812
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"5⤵PID:2552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\System\install.bat" "6⤵PID:2404
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:1736
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:4700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
PID:2996
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /start7⤵PID:5052
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /firewall7⤵PID:752
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /silentinstall7⤵PID:3472
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe1⤵
- Kills process with taskkill
PID:4508
-
C:\Program Files (x86)\System\rutserv.exe"C:\Program Files (x86)\System\rutserv.exe"1⤵PID:4936
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray2⤵PID:5064
-
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe"2⤵PID:4864
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray3⤵PID:4552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5d8358028bdac35e2ffadaf5a72555024
SHA1f0bc2b6e0053fe721b690bffe93a04b549078267
SHA2568baf37cca76efbc4630116888bc69f3dda6f6246c726de8b3a1fa3dfe3b5f5ad
SHA512dd4fde1890ecc0fce974c62f03ed1ed64c68a943fdce17bf2453ae8f465089df8b9991bcb8866a8fbd8babf411ba0e34122321dc8c5b0952a3cfbcca5aa63aab
-
Filesize
290B
MD59dc2286281a11ee72985dd2041a58ee3
SHA1de55198aa0f697ed77e98e3e61deb4cb70ba3b03
SHA25667f0f1704add831bd00a4977a185a2c97198cc4b3299233f62c3a0820716268a
SHA512ce4443ec8482cdce28bae0169b0d7df688190a596b914df0bbf62ae2598312c9bfc703ffd2d9b6c548e170bf4cb60cef9d4f9494b0e6391cd8cf6d45affa05f6
-
Filesize
117B
MD565fc32766a238ff3e95984e325357dbb
SHA13ac16a2648410be8aa75f3e2817fbf69bb0e8922
SHA256a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420
SHA512621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608
-
Filesize
11KB
MD57f1faef6025d6a7521ef5db7af41fcf4
SHA10aa9a15c4e39fa9ec65beaea09c74db19bd8a4d2
SHA256b9e125a892681078c3795a4bcd16f0f7e14037f7084bf5fa9e6d30ca380f6fcb
SHA5129f373b7027fcd20dfea904d46a5e4b73bf54e46e561555bbf1bf1b196bf590e6982855af8a42468d2056236982290d9fee4ea5d47f12be42b7ee402e2ed6a47a
-
Filesize
84KB
MD5ff048c8a10f63cb98c23e23c5fc8ffec
SHA19aa80fad6dd469fcb9d0d87c589f48a9d890b8ba
SHA256670d88b2477b38a214936fa8fca057d966f736242db6cf49dbe77991bf1efc02
SHA5120c698945ccbe40c7d4d819ccc8074b588f26d9409895a961f7d332d02da4e95912b12c02594c78296fe18dd0b288b70822cdbba941945bfe1ff0ba47019bea11
-
Filesize
47KB
MD575638bda133757775a4cfdd56f4ce679
SHA1ca11b9b614a24c341f3de238586a70194995204b
SHA2565b88a28ee551ac933c4a3d05db7e99b5c939534d63f701e94b5d5c512e31c375
SHA51203ee5e67ae356079ecc7aee59c1cb67c7d7c43a772eccd50de1033f59112b047e23e3d4c3c013ce2bfa2ffeed1525b57f8948bc00588eb93ddeb4ff85c7658e2
-
Filesize
55KB
MD541ce429d600490038f3f19eaea5fe065
SHA119687f940991e3bfd9000beb0bf0496accb8b7cb
SHA256b3dfb33df361f999e19bce2b942651bb797870695ceef659baafc0e59742cc96
SHA512548c85c94c921b90c986f81e16f66cdd787405a6a130aa9d568555268d023cfee3953d8ebdd656ccbd7dc9f0f690ca775147cfb981cb867e0a02641da85319d2
-
Filesize
15KB
MD5f24a3d675cce8297ab5f23c8465d593a
SHA15493cc0e17de28183bf16e7a0b6070f3002e13a5
SHA25678e210d0f886cae52aee8497483c9c961d132219aba18e0cb097c3aac39c03d0
SHA512a5d73a2c07530aa3dcd6c8ca4fa1746ce6d542cec7a2de6eb643e57e8a825189eeddf87467eecf20dcec001f6763a14b8db4c430729829a1013c535e669aacdc
-
Filesize
129KB
MD514338ef8a79b341dd6c8e4c253019b15
SHA120a705e4877a142bc366a7775afeef251eb5584b
SHA2563f470b6691430a6dfa55c7fc7198414c2e1cedcc5aff32e1545dae527f87cf5a
SHA512a25c1ab8e945543a84e6026c891db77689bc0dea17dea3ddb4b32bd2062bf31b8a18432bcfd0540b8696f5aa57958bfbd49247417358be0606b04d3686a42b4d
-
Filesize
16KB
MD5cddcdae12de9263a27dc6a0f695fc221
SHA1a5fc584660e438eac4df03c125ca32ddf5b6a3e4
SHA25670ebe3a8d3d1f4993c6096aee3b40198e110581a1e4a7e9e59df90de2b47041f
SHA5124300a72bad1b52c1c2d194ea544ba318d1988e2ed2064033e500751b781bb661001488201d9b08bebbee402cdee6e96333763dc99b048f9d317752033bd382ac
-
Filesize
8KB
MD565a851bc6e0ae209f037ac7c665b7aac
SHA1647a02230464a2ed7155cb840af2ca36fa7eaf6d
SHA256b9e5c849120361a2cef48b1bf7fcc1ab10f4d0a0cfaeceebc2619e2184bed69f
SHA5123183b5f64c7245d8459bb61ecb308a692310a816265db8ecd236f2480ca2b54179a6585e9bc18f1f92905e88c99d318ec3ac1c3581cfa5fa9dbccc718fe463da
-
Filesize
43KB
MD55e69052bde1bb4a771a06aa8ddd535af
SHA1c1d55d1dcb775640856ed22149d419046d2a96de
SHA2569b3d7a75daef3d3e21bcc96aa21c21fc9ad5151e15890240433bc71544e490fc
SHA512c62d9471fdc5f42eec4ebd4bd3ea222f769f4021fe312559ec21be01fb27421ba84b24e4608122a0fd62c699ba8f101b45c02bd60c9c8ba5174692c53a760316
-
Filesize
45KB
MD511ed328fcbd147b4ecd82fb80e20e473
SHA1c5bdcd5b532c31f239442670db8028bda45cab5c
SHA256810eb6bb8c4e1506589db3acd08f7b59e4b0a7de488c2a72710cef331adabadf
SHA51221281caea297688edc47b34893b7f0709ea49af14d271919d5f7674dbbe935f22bf7921825a900d102c9961de3aaac2bae51207a77b868ac946bda817d45188e
-
Filesize
155KB
MD5cefa6b93fc1858cabf20fd6158697bfb
SHA1073168e4045532dd384fb204c2a168fff94686ba
SHA256d4eb1abe89001ccaf3ec2ef8380e9de211d3cd91038fbdc72cebb5375e0ef02f
SHA5124e504ef29b7fe61e944313f9719dfbe341c01b6bf92bc4c5195186a74361ace337abb6437327f782c219127f32083fe462f609fa4066851a23e708e2969b2062
-
Filesize
194KB
MD5e8af4191c4cb2f9fa4822e27294fa439
SHA16b08fbd609909aae48d98fbe9cfd73e94221c576
SHA256e24e41913f7f1d0e1972e0a8f6c08169b186ab7a6514a2945a446db240713d04
SHA512c7b90450802fdbce234fb3210b59081444f7f7c5c915aff44762dba33b41763e9d1e7214b337dc156894a8230c8644cb05ca424d8c5b42d0d0cddfb09745d0e5
-
Filesize
44KB
MD508e2915df0ebc8f2bad47b34243e8c9b
SHA1c678c174cd31220b2ac74f2b035256acc9593cec
SHA2561b5f63f81dcb86f2c4fbea5014827b20389492c15b7075df23ad3e7e828b7ef7
SHA51234ad5002f4bdfec10c362d715f4a31edf15095a8a427ef5fd142959f45099a74df162e00a88b1981b99306e17612128f66aaec9f04c97926d4affee4f0c89446
-
Filesize
61KB
MD54862947f320d61dbfd7fbd480f227771
SHA1753c99c7ce9dc711f37369a1e9191e72fdddbc64
SHA25688d8198e1b8fe72b98afedb4806201a38e8c538e20cca3507287115d10cc68b8
SHA512d5b39a996f126a3dc4b6b6726aac934b90c0b72cad756889c9eb25389f4a42d44fdc463991d1355ebb3be07c684c9323753023e1e8dc22716e7860a2bdd3c4fa
-
Filesize
93KB
MD5f4d7672228266abc1f7fff17a08a160e
SHA17daf6d0df0aedade38d25c090043c8581ba912c9
SHA2564b5d2f51530d625817ecdc4af3dec5d1fa9910035361980f654f0a7b47f03b84
SHA51202fd951bc9d8211b58f381502f126b8155e957dff483a3577e64234a1b03b6ddf86dfc02465fd47b02a98261b675b811213916112735f42e72338fa5cec27186
-
Filesize
165KB
MD57668e56aac4ebfd633fcb233b1ef9a7f
SHA1104431694534666bfeeb754a6380e3337b26af06
SHA256693df27d4490371cbfac3a093aefa12c91490f4b27dde369876342e17e7bd8a0
SHA512fdb2b2c0512d0b993778d0a593b221bd7b710d5ec8ce3088c0b75720dcb74a5f9b040bf832007b13e55b9a3a8c810ccc3919247f5d7371a0fe094185e6f3da88
-
Filesize
137KB
MD53b4b9fa13282fea9660a11615079caea
SHA1757ba671d42d56c5a9e9a1e81128e6791aeab658
SHA2566631ab377804f7b52641f581240c406747377fd343fc3c431a647d9c21bbf75f
SHA512f138e2ad33397d86ad1480d0174fc16963cf44c4a491f4f831f038bfba98b5410d61120a83a8115d6b714a2c4418089044eb376de8aaef2e3d03f4735dbec20d