Analysis

  • max time kernel
    183s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 00:15

General

  • Target

    45a2ffef417a1c3f0ec0ae1bf679be5a.exe

  • Size

    277KB

  • MD5

    45a2ffef417a1c3f0ec0ae1bf679be5a

  • SHA1

    fe5c54aa77760c92b902b4e1aca79db67c291f0b

  • SHA256

    74e0cb283406e4316b91e715c53141ab320a95bdea2a11e004ea01ad2fedd28e

  • SHA512

    337a846dc64f629a56c11c51fbf7b15f1610656192d86ebc7ca69135337b493e399b877a11b596f1eebd98f17dee48e17203c1e5b1659a92fa846fe870cefc6f

  • SSDEEP

    6144:mzZZg0vFuLwCSkErG4YbVmRPEHJurarLr2ucs2oGJV7csYGwn:mzZG0tXbk+ImpEpurarHcs2oG37cb7

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 8 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\45a2ffef417a1c3f0ec0ae1bf679be5a.exe
    "C:\Users\Admin\AppData\Local\Temp\45a2ffef417a1c3f0ec0ae1bf679be5a.exe"
    1⤵
    • Loads dropped DLL
    PID:4676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsp57A.tmp\System.dll

          Filesize

          11KB

          MD5

          959ea64598b9a3e494c00e8fa793be7e

          SHA1

          40f284a3b92c2f04b1038def79579d4b3d066ee0

          SHA256

          03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

          SHA512

          5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

        • C:\Users\Admin\AppData\Local\Temp\nsp57A.tmp\inetc.dll

          Filesize

          23KB

          MD5

          7760daf1b6a7f13f06b25b5a09137ca1

          SHA1

          cc5a98ea3aa582de5428c819731e1faeccfcf33a

          SHA256

          5233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079

          SHA512

          d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5

        • C:\Users\Admin\AppData\Local\Temp\nsp57A.tmp\nsArray.dll

          Filesize

          6KB

          MD5

          6585fc9e20b149a15e4dbb8aab03dbf6

          SHA1

          d3839b1694341ad494b0f92e4e3c6cc1c18e2333

          SHA256

          08e298c9a25208730f165660af4eec21e9fbd8021c34bce12a020d27e51843d4

          SHA512

          234f98317ba3a0cad5954a261610e0c851f3ae01d8213267bf4c06b259b57f1cc629c81b10e0778755065973381be33496a2f2ed82fea6c92540a389d7126476

        • C:\Users\Admin\AppData\Local\Temp\nsp57A.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          f7b92b78f1a00a872c8a38f40afa7d65

          SHA1

          872522498f69ad49270190c74cf3af28862057f2

          SHA256

          2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

          SHA512

          3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

        • memory/4676-35-0x0000000073A40000-0x0000000073A4A000-memory.dmp

          Filesize

          40KB

        • memory/4676-50-0x00000000038F0000-0x00000000038F1000-memory.dmp

          Filesize

          4KB

        • memory/4676-51-0x0000000010000000-0x0000000010006000-memory.dmp

          Filesize

          24KB

        • memory/4676-53-0x0000000073A40000-0x0000000073A4A000-memory.dmp

          Filesize

          40KB

        • memory/4676-56-0x0000000010000000-0x0000000010006000-memory.dmp

          Filesize

          24KB