Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
133e7c91c44bb49be59c9627ee64e787.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
133e7c91c44bb49be59c9627ee64e787.exe
Resource
win10v2004-20231215-en
General
-
Target
133e7c91c44bb49be59c9627ee64e787.exe
-
Size
43KB
-
MD5
133e7c91c44bb49be59c9627ee64e787
-
SHA1
b412c205e7ae4c98a60962c1722b34f58256a1b5
-
SHA256
19db5436275e06b855cdcc70a443541dd2ab03b02f5d972bb145862cb9b9bb9c
-
SHA512
bb861c21c6c1be015be94cfbf2129605be38270a2b947c873af210c8b726d4c8e7f939720f73c9e596c0c20d7434399d634ea938d6248603171611f357add92d
-
SSDEEP
768:eXGUmbtwHyyY4444444e/X0gPBMqPX6OAZqbT+:eWb6yL4444444eP0MBTP1A0bT+
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d000000012321-3.dat acprotect -
Deletes itself 1 IoCs
pid Process 3044 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2904 133e7c91c44bb49be59c9627ee64e787.exe -
resource yara_rule behavioral1/memory/2904-5-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/files/0x000d000000012321-3.dat upx behavioral1/memory/2904-6-0x0000000010000000-0x0000000010011000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ed78ab9.dll 133e7c91c44bb49be59c9627ee64e787.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\fOnts\yGMHUAj5Npydj8FZ.Ttf 133e7c91c44bb49be59c9627ee64e787.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 133e7c91c44bb49be59c9627ee64e787.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID 133e7c91c44bb49be59c9627ee64e787.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A5CA6C70-7185-4466-AB45-B1C34E7A37CA} 133e7c91c44bb49be59c9627ee64e787.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A5CA6C70-7185-4466-AB45-B1C34E7A37CA}\InprocServer32 133e7c91c44bb49be59c9627ee64e787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A5CA6C70-7185-4466-AB45-B1C34E7A37CA}\InprocServer32\ = "C:\\Windows\\SysWow64\\ed78ab9.dll" 133e7c91c44bb49be59c9627ee64e787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A5CA6C70-7185-4466-AB45-B1C34E7A37CA}\InprocServer32\ThreadingModel = "Apartment" 133e7c91c44bb49be59c9627ee64e787.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID\{A5CA6C70-7185-4466-AB45-B1C34E7A37CA}\InprocServer32 133e7c91c44bb49be59c9627ee64e787.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2904 133e7c91c44bb49be59c9627ee64e787.exe 2904 133e7c91c44bb49be59c9627ee64e787.exe 2904 133e7c91c44bb49be59c9627ee64e787.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe Token: SeDebugPrivilege 2904 133e7c91c44bb49be59c9627ee64e787.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2904 133e7c91c44bb49be59c9627ee64e787.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3044 2904 133e7c91c44bb49be59c9627ee64e787.exe 29 PID 2904 wrote to memory of 3044 2904 133e7c91c44bb49be59c9627ee64e787.exe 29 PID 2904 wrote to memory of 3044 2904 133e7c91c44bb49be59c9627ee64e787.exe 29 PID 2904 wrote to memory of 3044 2904 133e7c91c44bb49be59c9627ee64e787.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\133e7c91c44bb49be59c9627ee64e787.exe"C:\Users\Admin\AppData\Local\Temp\133e7c91c44bb49be59c9627ee64e787.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\133E7C~1.EXE >> NUL2⤵
- Deletes itself
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e8d7e6ed3c0503e67322ad2155c455a0
SHA14510c036471d4a459c598587d44923a03bcd3015
SHA2562bdf96e0a19b1026eda9f4e612664c8e69994f55fc182a8b31b7c78ea5b79d25
SHA5124da1e61f5354f86f7a429632e70307530c717d60bc7869b71ae179ba98a7f82ff2cc6dff209b56a09f7d11b165f724e5b537b83f72e7de16351b304651d22cf0