Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 16:54
Behavioral task
behavioral1
Sample
2eca169fd7f602c9f34804a1e63503cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2eca169fd7f602c9f34804a1e63503cf.exe
Resource
win10v2004-20231215-en
General
-
Target
2eca169fd7f602c9f34804a1e63503cf.exe
-
Size
75KB
-
MD5
2eca169fd7f602c9f34804a1e63503cf
-
SHA1
e0c60d779743ddfdeb53de29ef16cbe74bd39186
-
SHA256
c1884c6a78808659fa705c9b190ed4a894abaa52cb57aa1b1496b6510e7c6658
-
SHA512
1f98b7fb7b4a75a9049f957cb987f2af91bd882c16b3d2840ec51d36a08fe8c1e88e694f036ac5676bd272125522dc203593781222ba2bec330ec45a19f502aa
-
SSDEEP
768:kC38CUm7jX+XZQoc2WMqvN9w+0i/gIcppdRB9SkTAQG1lC/izN:kChUYSTxO95rcppdR3AQElC/ih
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000012270-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2220 2eca169fd7f602c9f34804a1e63503cf.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/files/0x0009000000012270-2.dat upx behavioral1/memory/2220-4-0x0000000000220000-0x0000000000231000-memory.dmp upx behavioral1/memory/2220-5-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2220-6-0x0000000000220000-0x0000000000231000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Ms_Info.Obj 2eca169fd7f602c9f34804a1e63503cf.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Ms_Info.Obj 2eca169fd7f602c9f34804a1e63503cf.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08315C1A-9BA9-4B7C-A432-26885F78DF28} 2eca169fd7f602c9f34804a1e63503cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08315C1A-9BA9-4B7C-A432-26885F78DF28}\ 2eca169fd7f602c9f34804a1e63503cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08315C1A-9BA9-4B7C-A432-26885F78DF28}\InProcServer32 2eca169fd7f602c9f34804a1e63503cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08315C1A-9BA9-4B7C-A432-26885F78DF28}\InProcServer32\ = "C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\Ms_Info.Obj" 2eca169fd7f602c9f34804a1e63503cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08315C1A-9BA9-4B7C-A432-26885F78DF28}\InProcServer32\ThreadingModel = "Apartment" 2eca169fd7f602c9f34804a1e63503cf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 2eca169fd7f602c9f34804a1e63503cf.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD520867699e5dbb99da768490778c9eb40
SHA1b29bfcd498c2470b6adaa166918edb4762de461b
SHA256d8b52883ebbc4991513f98e767b3877745998fc8426b1de0769ea608bba00de2
SHA512a8bb6938b9f62a5576c40f772bd03b8555571515c46a9278c3c543f1940a171c9287747d9e7ab9938486d7c1a41424d561f019ac520a7d1a1357fa6d8c186b56