Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:10

General

  • Target

    157670a4ae60c8bb3b4098ecd7c75585.exe

  • Size

    448KB

  • MD5

    157670a4ae60c8bb3b4098ecd7c75585

  • SHA1

    08f5e24fae415f4377f307a1aa7a157adaa48753

  • SHA256

    09a14d8fd564b40b7db6c8d69e3acb39c356d2299431094a8958f4130723b75c

  • SHA512

    6e5883817fb344d101667304e621be5ad055269a6115b127b3342ee8f602ca62622185cb781744204bd81f85a4fb434709370a133ab9991d130a81d1124e2de1

  • SSDEEP

    6144:mGp8mKszXpyCzlOvClFx0R7FrMfgm0AwS0iX0YbHrYlmWVB6iJw8BIlAMiyGKWEy:bKszPIvCzAF1OwxdZmWWiG88AMJg/kI

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 5 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\157670a4ae60c8bb3b4098ecd7c75585.exe
    "C:\Users\Admin\AppData\Local\Temp\157670a4ae60c8bb3b4098ecd7c75585.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\_delme.bat
      2⤵
      • Deletes itself
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_delme.bat

    Filesize

    184B

    MD5

    beb18f16de83e4372fa076539e6418a1

    SHA1

    d6d526ec24ce3425d220afb490150c61e39b5021

    SHA256

    904971e2e3caeea4b8405cb8a8666439ee9ba60e9b836f5556a5d45e6132ebfb

    SHA512

    7edb24da8082187ad67d46f3bc856c08f507702d0a7aa603c9eee5faf5b0c29393bdda32db77215eec9b68686dccb01c05aed32d29baaf333e942474c06aaefc

  • \Windows\SysWOW64\FleshCatcher.dll

    Filesize

    201KB

    MD5

    b08da8984c936a7a7ec8a3b617532b5b

    SHA1

    aa85ec5a2518b541a19032f164e773d9620d9ca2

    SHA256

    bc039edbaf1bcbeff636fb941e68b987d727d713769cfd9aa8d7b153489a4c23

    SHA512

    7c1b1d32ec75b32df946ce04d72482982fb1cdbf8f587760a12307dc7e1dd09b2549889469ec52d3e51638d8dc042e42695af1a2656962538bfdf8a1a3ff66db

  • memory/2376-0-0x0000000000400000-0x0000000000509000-memory.dmp

    Filesize

    1.0MB

  • memory/2376-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2376-6-0x0000000002E40000-0x0000000002EC5000-memory.dmp

    Filesize

    532KB

  • memory/2376-14-0x0000000000400000-0x0000000000509000-memory.dmp

    Filesize

    1.0MB