Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:48
Behavioral task
behavioral1
Sample
1be717e23cdaf955f0e2e327379754bf.exe
Resource
win7-20231215-en
General
-
Target
1be717e23cdaf955f0e2e327379754bf.exe
-
Size
109KB
-
MD5
1be717e23cdaf955f0e2e327379754bf
-
SHA1
2e758253a847852ad83ee2f528313f268416f768
-
SHA256
817f3e4dc2ffbb7751beb0d1230bc36fc44edeb6b78c201db71c0fa5c3771318
-
SHA512
8accab82b6e2679b6e9a0b97322a3ac98c536413b891e4e235e70862cf5f5a40c128830d50d3e3dd57464f89cfa47f590bb60659efee9e17c8ff6aab524d4a5a
-
SSDEEP
3072:v0gntGj1RJdNgpJlGV/7oJN7j7+zOmgAtX2i9A8M:zntiFgpq6X7jlydp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002321e-6.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 3844 1be717e23cdaf955f0e2e327379754bf.exe 3844 1be717e23cdaf955f0e2e327379754bf.exe -
resource yara_rule behavioral2/memory/3844-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3844-1-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3844-2-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x000700000002321e-6.dat upx behavioral2/memory/3844-9-0x00000000001C0000-0x00000000001FC000-memory.dmp upx behavioral2/memory/3844-12-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3844-13-0x00000000001C0000-0x00000000001FC000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EBF89BD2-9D06-406F-879F-8CCC82F4E117} 1be717e23cdaf955f0e2e327379754bf.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBF89BD2-9D06-406F-879F-8CCC82F4E117}\InprocServer32 1be717e23cdaf955f0e2e327379754bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 1be717e23cdaf955f0e2e327379754bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1be717e23cdaf955f0e2e327379754bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBF89BD2-9D06-406F-879F-8CCC82F4E117} 1be717e23cdaf955f0e2e327379754bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBF89BD2-9D06-406F-879F-8CCC82F4E117}\InprocServer32\ = "C:\\Windows\\SysWow64\\atlthun.dll" 1be717e23cdaf955f0e2e327379754bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBF89BD2-9D06-406F-879F-8CCC82F4E117}\InprocServer32\ThreadingModel = "apartment" 1be717e23cdaf955f0e2e327379754bf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3844 1be717e23cdaf955f0e2e327379754bf.exe 3844 1be717e23cdaf955f0e2e327379754bf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5d90fd90073d53175bd568b1dbdebbbf7
SHA186769a22dc0b0e7f6244248e87bd71695bf4dc2e
SHA25681489f426a744e59d6f7d3ee7969b7e01df0f73efcd8676a4b82f788d4317408
SHA512372a69316ed2a2419d2dd9f8200ae2d9c77fbae2493ecf5fc3a87302cf7b4cbf85fd9a7a37ed5c23aa9be79e56f0baced9280e0506bb1759fb038baa0138ccbe