Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:43
Behavioral task
behavioral1
Sample
03959826a04eb1abdef5b0048c9cb96c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03959826a04eb1abdef5b0048c9cb96c.exe
Resource
win10v2004-20231215-en
General
-
Target
03959826a04eb1abdef5b0048c9cb96c.exe
-
Size
691KB
-
MD5
03959826a04eb1abdef5b0048c9cb96c
-
SHA1
1a0a1246025816c2209358e257fc301f08b32741
-
SHA256
ddaa45fea6829db2552f231cd2ae98d09a8edfd8b64ccf8cb9996b41441adbd0
-
SHA512
2577394efdddf96110db9d13334c7f53b74e288eb28df45a245e3928d1d4c046c89117e0a322e8f5a1a00cae1201ea6b43a6cb51b34a8233a74eea6f9f43cc6c
-
SSDEEP
12288:5OOKxDOoRbtBYoukrYHlzoe39DOZVwCNoSzC93W68d/hnoiM344n7NjHj+jlY/9+:5OhH1YFpHFN3BxN9f8dg35nIy4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000400000001e78b-30.dat acprotect -
Loads dropped DLL 3 IoCs
pid Process 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4808-0-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/4808-13-0x0000000010000000-0x0000000010046000-memory.dmp upx behavioral2/memory/4808-14-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/4808-15-0x0000000010000000-0x0000000010046000-memory.dmp upx behavioral2/files/0x000400000001e78b-30.dat upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 03959826a04eb1abdef5b0048c9cb96c.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 03959826a04eb1abdef5b0048c9cb96c.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe 4808 03959826a04eb1abdef5b0048c9cb96c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4004 4808 03959826a04eb1abdef5b0048c9cb96c.exe 104 PID 4808 wrote to memory of 4004 4808 03959826a04eb1abdef5b0048c9cb96c.exe 104 PID 4808 wrote to memory of 4004 4808 03959826a04eb1abdef5b0048c9cb96c.exe 104 PID 4004 wrote to memory of 5020 4004 cmd.exe 103 PID 4004 wrote to memory of 5020 4004 cmd.exe 103 PID 4004 wrote to memory of 5020 4004 cmd.exe 103 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5020 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03959826a04eb1abdef5b0048c9cb96c.exe"C:\Users\Admin\AppData\Local\Temp\03959826a04eb1abdef5b0048c9cb96c.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\03959826a04eb1abdef5b0048c9cb96c.867D0\ySvI.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:4004
-
-
C:\Windows\SysWOW64\attrib.exeattrib -a -s -r -h /s /d "C:\Users\Admin\AppData\Local\Temp\03959826a04eb1abdef5b0048c9cb96c.867D0\*.*"1⤵
- Views/modifies file attributes
PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5e036317f886ebd072b8e460410e41798
SHA1439042c6cccd4ef8a5d6a184ae4f5b89d87c2976
SHA256ed36f4fde26dfeb27eecc4854fc82ea6dda2ee2d021455b9b78e4b7ab2725a6c
SHA5120ccc0ed17ed7af13c5d5dbb4704d258a6e9ba095fe92d9aa3e43194eb10e1ceaa2a29fd74d6584a7282fdedb2ef2bb77be8b716309f3964d6d82d14211f86759
-
Filesize
74KB
MD537adc90bb984551751410d9e4012721b
SHA1c1834985a3c52faf383d35e483644b116cadf706
SHA2567ef60380175aaf88552343f8068f58e7d7fa3e4285ca3ef10ccdbc4e60b7978b
SHA512618de79dc8fb1789a5e80d79a868b9c8d8f4212beff8a7c84cfbe433bc36b59f1a7baf9f8e7f8398b2d69fe461047557cc0b078a75fcdab172569e9846cc7be6
-
Filesize
321B
MD57766f750c252e6a9a7d8ec1e04481920
SHA1d28cf87472220aab77104c622d5b5cd7b4f34ad2
SHA25655a0d680af8ad786c24c08e6a25701992b82b94bc7451a4014ed004422860fbc
SHA5124360e82f5a30f0b9abc8c0b0cafff7dfd8a9271bb3d49f7ff3fe77a3494265e33395b275fcd31419dc785b02e2038b6026013ddef2f87ab64a18bd3b61fa40b0