Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 20:25

General

  • Target

    10c60b42707b709192b10d963a19c6a1.exe

  • Size

    5.2MB

  • MD5

    10c60b42707b709192b10d963a19c6a1

  • SHA1

    5348a2fc4d5292942f4676d0e983579f5b1c71e9

  • SHA256

    53b53d2f32ab95be7a05c767471024cddc994dcd544c660fbac8063504841d4e

  • SHA512

    9c40f0ad44553e7e5f8708913a5b7c5f5c130687f4985a928f5e33c8255504f4fb0694e98631fb793e477b5d80071c9e7986b0bfa0a823647c3a4508b4e375a8

  • SSDEEP

    98304:PuF6ijSedheAclznDx0NkdsXNB12L79wp9npmMiK0L9jOlWXQTdFK:P1ixdijDc8sbq6vmamwLO

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10c60b42707b709192b10d963a19c6a1.exe
    "C:\Users\Admin\AppData\Local\Temp\10c60b42707b709192b10d963a19c6a1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{A04E77A2-E166-4D81-9D7D-40956E4C3311}.dll

    Filesize

    120KB

    MD5

    c9f333d1ff898672a34805f94a265329

    SHA1

    2deaac66698fb2e9b3868d23034c3211c508b739

    SHA256

    07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

    SHA512

    048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

  • C:\Users\Admin\AppData\Local\Temp\~zm_{07AE2591-D894-4A40-92F9-1D8BC685E056}\css\style.css

    Filesize

    1KB

    MD5

    5b988eba5206504a7a9ef9567a71d576

    SHA1

    016139e5b3e8dbe79c0d8df6c94329f1f51dd8b8

    SHA256

    7eb7963147385f4dc813c02fc0109e9fc5525b4021eb6cf2f1402bdf4c0f4b31

    SHA512

    8154a5101f4360686c405a636037c724b55affcc31e3ff6f3a78c24e77c2816732ef1732c565cf34a41fa78523a4c3738d06c11e3454b21986126630f5c9dd47

  • C:\Users\Admin\AppData\Local\Temp\~zm_{07AE2591-D894-4A40-92F9-1D8BC685E056}\index.html

    Filesize

    1KB

    MD5

    0a67859cdbbd7dd49cd5cfff049403e0

    SHA1

    adace2f52d9aa1de1ffcc115639b7ab6bc35e4bc

    SHA256

    2e57a485465414f6ba3efd0d61c23a73adef495984e4a8a8dc38785f800efab7

    SHA512

    73bc711fa0cc7bbd3d17ccf2dcd2eb16b46ca75b793e268028638660ad89dfddcc5d628a426c0e1fe1d66ade5f86ce95f3cbebb111a8e7448af77025c042d7d5

  • C:\Users\Admin\AppData\Local\Temp\~zm_{07AE2591-D894-4A40-92F9-1D8BC685E056}\js\common.js

    Filesize

    102B

    MD5

    fd7b0ad90e04f867f0caf572d03b6d1c

    SHA1

    f54f16fcb066d29d280276dd280b7ee7c83a1573

    SHA256

    c9c9589c41594137ef6f54b394d3495910601e8f0d77f4ba0866b513e84a24e6

    SHA512

    0215bd6562e26025c3dd0e6d9696a930368a146bd6d9eab8b0b30149ceeb03a8d0f7b8511203f27e3adcfc5affb9ef7ca040659eb670fead4289c233910f553c

  • C:\Users\Admin\AppData\Local\Temp\~zm_{07AE2591-D894-4A40-92F9-1D8BC685E056}\js\lang.js

    Filesize

    632B

    MD5

    f3ca8504fe38798d402ada65acc0923e

    SHA1

    8f9930721e2a559be8e4379cb6e9dc9ffd71ef52

    SHA256

    f4b4d8d4bb78d970a3fcf6dc8ee0353776801ef373b54d839cd8853c1481a378

    SHA512

    ab1324ec6f5dcd034efadb6eef3224244de5eb328a4c28e4646a7a182d6af2ec60dad50f52b1e8aedbe18e3eb6a03a4705949763746952492e9abb0f9e01bec7

  • C:\Users\Admin\AppData\Local\Temp\~zm_{07AE2591-D894-4A40-92F9-1D8BC685E056}\js\unitpngfix.js

    Filesize

    959B

    MD5

    997b4c4553a419650ec27b7f53cd94ef

    SHA1

    13a577fe4669412ef3d54bd761ff7878876079c1

    SHA256

    a044dffe80c9ce80d2364681836b7835fdc1c49f30ba83192231e5089973c9a4

    SHA512

    5f423448c03f1f79b4cc326125e27e60a57bf54c9c834c6be6b848712a814c71376a2def86bb5bbe20c4856798ee88560222f9ff60a9e81a5ece1110d7ef76c7

  • memory/4736-90-0x0000000005260000-0x00000000052BB000-memory.dmp

    Filesize

    364KB

  • memory/4736-57-0x0000000005260000-0x00000000052BB000-memory.dmp

    Filesize

    364KB

  • memory/4736-6-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/4736-0-0x0000000000400000-0x0000000000569000-memory.dmp

    Filesize

    1.4MB

  • memory/4736-2-0x0000000000400000-0x0000000000569000-memory.dmp

    Filesize

    1.4MB

  • memory/4736-1-0x0000000000700000-0x0000000000706000-memory.dmp

    Filesize

    24KB

  • memory/4736-111-0x0000000000400000-0x0000000000569000-memory.dmp

    Filesize

    1.4MB

  • memory/4736-113-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/4736-114-0x0000000005260000-0x00000000052BB000-memory.dmp

    Filesize

    364KB