Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:15

General

  • Target

    04351c0c12538ceb7e635373dfd74a9c.exe

  • Size

    1.5MB

  • MD5

    04351c0c12538ceb7e635373dfd74a9c

  • SHA1

    554b1d094e75328279922c70602632eb7a5f94b9

  • SHA256

    e055789d3b565ba0f1dbd94afe2d0022d2685c212622e3016c601fd6bbeb231d

  • SHA512

    b3ded6f81fd881eb188ac1d7d9d3404600410ab0883d0ec725c53949e21d38122ea747a2763e4a34d1d97357f7cd8b8d76b0a5cc491517fce71eda3e36fbf3dc

  • SSDEEP

    24576:+WeDCr/T++/RfZSTZaqdiXSp0c02uFG6dAk3HMNkrd:+mrrdgTZaqdwk0c05HGi

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04351c0c12538ceb7e635373dfd74a9c.exe
    "C:\Users\Admin\AppData\Local\Temp\04351c0c12538ceb7e635373dfd74a9c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:4032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 2620
      2⤵
      • Program crash
      PID:1092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4032 -ip 4032
    1⤵
      PID:3300

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dll

      Filesize

      86KB

      MD5

      147127382e001f495d1842ee7a9e7912

      SHA1

      92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b

      SHA256

      edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc

      SHA512

      97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d

    • C:\Windows\SysWOW64\SouGoo.ime

      Filesize

      52KB

      MD5

      b60da4e2e5aceba3ce3d87ee2cd872ee

      SHA1

      9bbdbf1f3ce2c000a86e0473da756a4b1031db41

      SHA256

      b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

      SHA512

      664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

    • memory/4032-5-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB

    • memory/4032-8-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB

    • memory/4032-9-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB

    • memory/4032-18-0x0000000003630000-0x000000000363E000-memory.dmp

      Filesize

      56KB

    • memory/4032-7-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB