Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:14
Behavioral task
behavioral1
Sample
1e228f497ad1b1a28db896002b617c68.exe
Resource
win7-20231129-en
General
-
Target
1e228f497ad1b1a28db896002b617c68.exe
-
Size
109KB
-
MD5
1e228f497ad1b1a28db896002b617c68
-
SHA1
57fa2261535e37bd3ccb54802f7cf9e1a054a1a2
-
SHA256
715ccca3a0e8a5bdf2209b903a3f210fef282ae252f8dda183f286924ed4bdb6
-
SHA512
3114d5c3d18ddb09dde068b795b222901bdf9763739294c8c62a3ba6c27ab782bc32b93fc9faf4fb67fb04b4eb7ad92ffa5764933fadbbbb92e9bbd35dcad8f7
-
SSDEEP
1536:MaMsJikJEvMhU6IQSMwdzDye4X9U69/QTw9dSAvRtU7YBbFxNBWUbc+dZ/Tgx4kd:M6i+E0hLwtye29USxSApGkd+ZsqxpV
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a0000000126af-6.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2928 1e228f497ad1b1a28db896002b617c68.exe -
resource yara_rule behavioral1/memory/2928-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2928-1-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2928-2-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x000a0000000126af-6.dat upx behavioral1/memory/2928-8-0x0000000000260000-0x000000000029C000-memory.dmp upx behavioral1/memory/2928-10-0x0000000000260000-0x000000000029C000-memory.dmp upx behavioral1/memory/2928-9-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0108DA2C-F19B-42DB-8050-3EC15DBC1F1B} 1e228f497ad1b1a28db896002b617c68.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0108DA2C-F19B-42DB-8050-3EC15DBC1F1B}\InprocServer32 1e228f497ad1b1a28db896002b617c68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 1e228f497ad1b1a28db896002b617c68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1e228f497ad1b1a28db896002b617c68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0108DA2C-F19B-42DB-8050-3EC15DBC1F1B} 1e228f497ad1b1a28db896002b617c68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0108DA2C-F19B-42DB-8050-3EC15DBC1F1B}\InprocServer32\ = "C:\\Windows\\SysWow64\\api-ms-win-crt-math-l1-1-.dll" 1e228f497ad1b1a28db896002b617c68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0108DA2C-F19B-42DB-8050-3EC15DBC1F1B}\InprocServer32\ThreadingModel = "apartment" 1e228f497ad1b1a28db896002b617c68.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 1e228f497ad1b1a28db896002b617c68.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD55dadb2a32bb8c6ee147f7892b35648dc
SHA13b20fd7904270626ff97a8ed44243924c959f474
SHA256b2fdeeb4baa0346e36a7f9455ec95abcbe21fc80aadb332fe743d5a0c4da6f33
SHA5120d686ecbd7f34b4bc7fe4e0788000acf2e2dfc623adb71176cd864130a3fa6fbe98599742e836fe2f90aa5690782b8638f4974a364157961c007f763a4d9ec51