Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:25

General

  • Target

    145e8c917d3ff3de470ada7196e1af76.exe

  • Size

    247KB

  • MD5

    145e8c917d3ff3de470ada7196e1af76

  • SHA1

    629a88ab11f9a6185002c491800ead60692e3ece

  • SHA256

    22ed16a2d4d92b798195d3d6ac9ee414eece19f6f305391fdefcf2c944b96456

  • SHA512

    8c8253d14f88e4fcbdd799b36a0f993fdeb1dd3553045709301f5f48decfb287209fa0053ea9375f2bd62495238ae6e13352e8b9cfa93212af029e449b1b2b5a

  • SSDEEP

    3072:9FXoDt6QAmP/NO4v4ZkxhJbk3+xoG4CbUBJLpex7Sr1uG7mfw5OU8zt+L9Kh5xKm:4AQnIaoYPoCbU1eVSr1uGyo5OU8+hGxb

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\145e8c917d3ff3de470ada7196e1af76.exe
    "C:\Users\Admin\AppData\Local\Temp\145e8c917d3ff3de470ada7196e1af76.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2140

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsi1DA0.tmp\inetc.dll

          Filesize

          25KB

          MD5

          29e2dcdfb57ee3ab5e2bbc2fc3c42f02

          SHA1

          bd6cafcce5b70ee15311f9f53e9fd4aac819ccda

          SHA256

          2b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f

          SHA512

          f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a

        • \Users\Admin\AppData\Local\Temp\nsi1DA0.tmp\nsDialogs.dll

          Filesize

          11KB

          MD5

          66cfc94903c8cfa492fdab42bde2026d

          SHA1

          d07194419d914eae5dc54a480ebddb0a8cb32f25

          SHA256

          82e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632

          SHA512

          ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7

        • \Users\Admin\AppData\Local\Temp\nsi1DA0.tmp\nsJSON.dll

          Filesize

          7KB

          MD5

          b9cd1b0fd3af89892348e5cc3108dce7

          SHA1

          f7bc59bf631303facfc970c0da67a73568e1dca6

          SHA256

          49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

          SHA512

          fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

        • memory/2140-5-0x0000000075490000-0x000000007549A000-memory.dmp

          Filesize

          40KB

        • memory/2140-23-0x0000000075430000-0x0000000075439000-memory.dmp

          Filesize

          36KB

        • memory/2140-32-0x000000006EB40000-0x000000006EB4A000-memory.dmp

          Filesize

          40KB

        • memory/2140-30-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2140-36-0x0000000075430000-0x0000000075439000-memory.dmp

          Filesize

          36KB