Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 15:17
Static task
static1
Behavioral task
behavioral1
Sample
03623e2a9b8389078df3960a8002e937.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03623e2a9b8389078df3960a8002e937.exe
Resource
win10v2004-20231222-en
General
-
Target
03623e2a9b8389078df3960a8002e937.exe
-
Size
389KB
-
MD5
03623e2a9b8389078df3960a8002e937
-
SHA1
17ae5b3796a8fa39b887aea99c94bdb52fbdb081
-
SHA256
137e8a1b62cadf4475e77b7fe4d3c2827afa6f54a1df2016e8168f787602cfe2
-
SHA512
a99f0d4407fb85775f9175d50345e107b46310388ee51191d63efac9387e10736d9ec5e9becb9bc95160b5390f20e180e0dfdac23d9fde40e8cee6aedf02f5c6
-
SSDEEP
6144:G+fadogFuO9ik96bDMe2mqVzNudSNbzag1HqxWJkD7vL373adHzsKIZTmbnN2KoK:GfdrX96P499hBWeKxX7r2BE4bYKohr8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015f01-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1328 03623e2a9b8389078df3960a8002e937.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3EF8021-A27A-11EE-8D15-FA7CD17678B7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\Total = "44" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409597682" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\qqgame.qq.com\ = "44" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\qqgame.qq.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1328 03623e2a9b8389078df3960a8002e937.exe 2172 iexplore.exe 2172 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2172 1328 03623e2a9b8389078df3960a8002e937.exe 30 PID 1328 wrote to memory of 2172 1328 03623e2a9b8389078df3960a8002e937.exe 30 PID 1328 wrote to memory of 2172 1328 03623e2a9b8389078df3960a8002e937.exe 30 PID 1328 wrote to memory of 2172 1328 03623e2a9b8389078df3960a8002e937.exe 30 PID 2172 wrote to memory of 2052 2172 iexplore.exe 28 PID 2172 wrote to memory of 2052 2172 iexplore.exe 28 PID 2172 wrote to memory of 2052 2172 iexplore.exe 28 PID 2172 wrote to memory of 2052 2172 iexplore.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03623e2a9b8389078df3960a8002e937.exe"C:\Users\Admin\AppData\Local\Temp\03623e2a9b8389078df3960a8002e937.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://qqgame.qq.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51a37b964060d07fcbca3acbb3efe8416
SHA1054d7f800a03f3b311b3853a148e8d4c056feecb
SHA256c6c6359a12256f8202e33b34a92b590c1ec131d668bfb74d453227591d16b661
SHA5122c684ab59e8f4bfc289772c3d97c335a1e9391dea50b718b55583ca08634b3215825cae365a292d5dc4a841a0cb5b8343e485f7878ec5a6301b75912f8160a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814e18ada5253f1c2c2806f852e8a5ee
SHA131a3fb721bf3aba7b3ff0251ed13b3b64768aca5
SHA2561d65cad5303306d2d17d6c7ca1b96c96eab9b960489f71f8edd488a3688cfdf2
SHA5120d514b1a71e8d6ccfbbc14208fd3689bed321b71212d8a7edb07fcdf3702daa1a32096d6f412c7df4c50a96b76d04b72e0250ca72e8f0f329e112aed28db3f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577c1c08ad1cd00feb11a4d0b4a8f36a2
SHA19c3df23f462f77c4db980b31f9091a9072ce60b2
SHA2562e87d3d7c6ee37cc5227f962786876d911c9122beef7b24adf44d64da4412506
SHA512657f5c9568578f97edb1c896d059002b4bbf68f75b10d3c23fbc3e9865d127af99e599ecfc8e533fce9bf9aec475607a0727a9e8f637de494cdfb7af7e803fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aeaaaf36d051a5f63e3f12a7e80af2d
SHA16546e20aa9a743348c8a45bb4cb7f8bb004f5a2c
SHA2562015bc15c8c15821d237e2bd8525a60444fec188b50d2df8608b2656d816e87f
SHA5120dcd7bf3858f1feee0a34760d24617579e43726ec35b1b1b5e0b71ab2832e564b34df18a3e066dbd90ea996b3efb8347591c0ec2d4f46c3e92f991882344265f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c4a5ea259a24df594672c05caabc1e3
SHA1b175bf7f972907e76f23cb69d382c4da494414f6
SHA256b83ac49f9e3040592f61aeda6df8d57db2a0c6150ff468d89782106d965ecd04
SHA512eafd836c460ac7531f262fba244de440b0ce86be69c49cb97cbfc1ec8b1067be98cf3a14f3ac2bcc051a26e2f48ef4f2ed10c73abe594c8d89dcc1a79c4468be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d714b1315d070b31c4334b156bc40276
SHA13f8417ca30d664097a8abf4ee48fbaba75c39575
SHA256abc63409ec6402b215b00d3622349d0ce90da7fd262790081de8b53751dfb1cf
SHA5129620ff0414502a24677862a1832e4c3b8373df3248f69aeb58be2a4210dd2b1944a06b1a4e28d2c43426ee796d59a734fe61ad410e669ceaacb6a0163099e21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517023a25a069034a2834ea0490084f00
SHA1d09a534dbeb5cc23ee1f796c43eb43abd267c102
SHA256190b91529495ed048ebab0ef541393c4439c3f283763f1e6deaed0b57891a0d1
SHA512e13fbeaa9eb00e290e28795c3e9e7a43186a39334ace42129d1f65dd2fe5d4c474e0e0215b501287a76c46cf0feb3affe18fabc53442ee2cd2f78680d817beac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a2c03b0b9d081063efbf35b3348e20
SHA14ae9a5e3bc29e315bb2bfac64ae333270ef6a24c
SHA25611eca50331385f40a2101a1d2f4bdf971e3350b431e03731bee63f4cb88ca99d
SHA51212d19ec19e044e1c0cdc1cb05d6d59bc11163195fe908cef428a557968d10476d02f49958134208ddaeee27e21ab1047a78da9b08bd0b7211aa543a2115d06e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5d91e6620acbbcf4c15e2890ab3498
SHA1abf30ed01bdb8487fa327ef962ef346437b6a9b1
SHA256d3e58ad18e6c381f1e6f815122cbb3a3303370edf42a22b56763b26e0666368e
SHA512884ea91bf9c13e7ba9a32cce8cf305704b7dca17d6f48f628dd8052a010e284581bd487f29f47fba708063f29470539629b818ad54a3dfa576245d3262b622bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f9271a21b513f2af01dd6dcf9475bf
SHA189767b662537daa8f9bde4e4f76add133fef5b33
SHA2561c3e0c814307cf5c945521ca01735c955ba8430db4102b0eadfc7591b557324c
SHA5120186979a110dadd2044e65fbccdbffadb094204b306a17f44e09e3d5806a65711b9d6dfd5f6b116e221432dfebe74a06ab71e1a285760dbee59a8c42d959625b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2033f81e95bb4aa0e9ad3099f322c9
SHA12cb61b75d96a3fbe70ed0b80343d6997171f4a25
SHA2564758cbd5e3bc912fb1788018b8118e8aa2e41f473b340d10eb2d80e3e4e001b9
SHA5128e211199eff4ba146d61ddb72714dbb94cfc8ac4798bfbd51192bfb592e1e7291004664a6dc4525a6c3287676fd2302eafd9d45e07d09214d98fbb30c53a7335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d9a8d1226d1ee2da00b57b79f6cbae0d
SHA19af51549c68d5f15ee95a49e5eb7dca07dd73010
SHA256378fb1a7dd5d6afdcbd1bceee7d5403959471a05dd3eb99d5be40b57433d3e49
SHA51299f557d747731236d473688268502241d1c80dd3014a90669014bf248df2c947cb60db800ab71545bb48f2d34c3590dc4ef6a3cfbb5bf04511e0b2d475b61465
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
141KB
MD5791cec2e740cab13a69a52394f43854c
SHA13261f4243ef861e24fe5b983a088e90b0a373f91
SHA25632e2fbedabb46e8e1c99bb1ed8fbb51a80867227eaeb8ebb58afaa7058a61333
SHA512240325ff01c5dd5847963f1a872d5d97aea783a09c5cb7edbcbd0f6bdf95dd83d63f2d44229f3b84db3709dbdeb1f278d90a34d55327a5578de9fcfdf1a78644