Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:47
Behavioral task
behavioral1
Sample
039584401fe63d387cab2fd3956a8001.exe
Resource
win7-20231215-en
General
-
Target
039584401fe63d387cab2fd3956a8001.exe
-
Size
119KB
-
MD5
039584401fe63d387cab2fd3956a8001
-
SHA1
98eb8d32d8f20838eb88f285c1ea5b84abd4cb5c
-
SHA256
bde6bd507c29fa42677c86f436ea8fe67c461053b0c17d4699f574d18e019b1b
-
SHA512
82717cdfc759962831c82072646a3cea798e07a926bb1104acae8287431054994fa89b53822c286ee2b2081c2e3f26f5226bfff284ece9b0fdc0635210912ed8
-
SSDEEP
3072:xoR17PL9SAPTusOJZsrWMhfilbiTiAT3wd/lnRHVff8gL:xoR1f9SeTuGW1t6TAd/lnR9
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c000000016c1a-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2260 039584401fe63d387cab2fd3956a8001.exe -
resource yara_rule behavioral1/memory/2260-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2260-1-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2260-4-0x00000000001B0000-0x00000000001F0000-memory.dmp upx behavioral1/memory/2260-3-0x00000000001B0000-0x00000000001F0000-memory.dmp upx behavioral1/files/0x000c000000016c1a-2.dat upx behavioral1/memory/2260-5-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2260-6-0x00000000001B0000-0x00000000001F0000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{599026D4-4B0D-4F54-91C5-E819DC03CA54} 039584401fe63d387cab2fd3956a8001.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 039584401fe63d387cab2fd3956a8001.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{599026D4-4B0D-4F54-91C5-E819DC03CA54} 039584401fe63d387cab2fd3956a8001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{599026D4-4B0D-4F54-91C5-E819DC03CA54}\InprocServer32\ = "C:\\Windows\\SysWow64\\api-ms-win-core-localization-l1-1-.dll" 039584401fe63d387cab2fd3956a8001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{599026D4-4B0D-4F54-91C5-E819DC03CA54}\InprocServer32\ThreadingModel = "apartment" 039584401fe63d387cab2fd3956a8001.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{599026D4-4B0D-4F54-91C5-E819DC03CA54}\InprocServer32 039584401fe63d387cab2fd3956a8001.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 039584401fe63d387cab2fd3956a8001.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 039584401fe63d387cab2fd3956a8001.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50ba31432867ff6d8894937742de8a9b4
SHA1b8625730f74f37ca7f05e53e5a612a0f19775144
SHA256c048c1f3efdaff60f6fda954fdeb3111b1e9473d1a3ab7e12eda13451b5b626e
SHA51261b02c15b5d230af192583ade4ec4b231df2d0639a3f6bd69bee4309f5e2a632be2c90c02a5fa99835bbe1d16f35db6623454d463d42c5569c17e2082f96598b