Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:21
Behavioral task
behavioral1
Sample
018ddb4be30ecbd3c73c984d9f628baf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
018ddb4be30ecbd3c73c984d9f628baf.exe
Resource
win10v2004-20231215-en
General
-
Target
018ddb4be30ecbd3c73c984d9f628baf.exe
-
Size
345KB
-
MD5
018ddb4be30ecbd3c73c984d9f628baf
-
SHA1
34c069ffc39b0694bd5f7e217e460fd1892d89f9
-
SHA256
0634f3329ffe43fe810e7e3839a2fd6b405f191c3ef392c3ff8207ee955f63ae
-
SHA512
5cfb71edad4b45f25460dc02f80e784663b324b244518e1c6654f6308ff17bf39e1412f1566afe105f8a9230e062031bfbc5ab2b8ba7d2f2cbc6aeba63e0b727
-
SSDEEP
6144:cLhb9c0JB1V7V4BKx4OYke4DKEbYznfeEJrDu9GBXQf1RVi9uIu:cLDcQnVOG4OYke4YznfeEeGBANzi9uIu
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00050000000006e9-2.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 2576 018ddb4be30ecbd3c73c984d9f628baf.exe 2576 018ddb4be30ecbd3c73c984d9f628baf.exe -
resource yara_rule behavioral2/memory/2576-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/2576-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/2576-63-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 018ddb4be30ecbd3c73c984d9f628baf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2576 018ddb4be30ecbd3c73c984d9f628baf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1815711207-1844170477-3539718864-1000\58b509c3f65696668c836e38a17ee52b_06e98980-15b5-4d19-8f6d-e648d137a418
Filesize52B
MD571f0a0976ffb68beb323f97d898bde77
SHA1c89707a323bd14f34b97390cb8be7cf92113431e
SHA2565c4647f65619cae1cf6a0ee07865199b68bdd3a825501f403866e11201ccd388
SHA512620c78bbacdbadb92543ecc5a7a49d43ff5a0d1ec701fb301c9cd074df3a97b0c7a786de87b7680cde8f9dc85b7a43305b4bd7e06f4b7464d7afcf97628e610e