Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
21a2347c8349eb94e758073b01f24486.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21a2347c8349eb94e758073b01f24486.exe
Resource
win10v2004-20231215-en
General
-
Target
21a2347c8349eb94e758073b01f24486.exe
-
Size
769KB
-
MD5
21a2347c8349eb94e758073b01f24486
-
SHA1
cb06b9f3e49ec0d36ea9262d2838e41b6e2abeb1
-
SHA256
051dae9b11fe60c3d6bdd2203808cd30d49bc6ff50680e29047216f81c3f9ef1
-
SHA512
5ce6f083caa254d25535b98c71a24af714c10085262c6227d8211291fc32d9d588448f12fa0ad52a6d20469b1066c20094a00462caa1603fbe9b6ea0e9478fa1
-
SSDEEP
12288:G6iYNDsam14R0ncYv7TM3MkQge+Y5nsfBWMc7vfILb/4nXLXzkO5s:GZwV9R0cMHt+Y+fPc74fwnMss
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c00000001220d-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2116 21a2347c8349eb94e758073b01f24486.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DongFangInput\2.1.1.0326\DongFangInfo.ini 21a2347c8349eb94e758073b01f24486.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2116 21a2347c8349eb94e758073b01f24486.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2116 21a2347c8349eb94e758073b01f24486.exe 2116 21a2347c8349eb94e758073b01f24486.exe 2116 21a2347c8349eb94e758073b01f24486.exe 2116 21a2347c8349eb94e758073b01f24486.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 21a2347c8349eb94e758073b01f24486.exe 2116 21a2347c8349eb94e758073b01f24486.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a2347c8349eb94e758073b01f24486.exe"C:\Users\Admin\AppData\Local\Temp\21a2347c8349eb94e758073b01f24486.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5c78056ac4ebfc9ec3ec7032a2d8c2bfc
SHA101a66479cef728b03c2e5710183db1b156a99fb4
SHA256957e295225520bffa564720c6b9e5c526d91fbe3ff589793ada309497ab07cdf
SHA512c0ecd3ae6b32b7c081332441b0e578825525a744c3ded0653642afac3fd2b275cb67eeb4b6e4b2acb8fb11538ae303229872000c926dea93780e777768d6b4f3