Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 11:25
Behavioral task
behavioral1
Sample
4e2c807c4d900d0f5315c6b87af00b61.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e2c807c4d900d0f5315c6b87af00b61.exe
Resource
win10v2004-20231222-en
General
-
Target
4e2c807c4d900d0f5315c6b87af00b61.exe
-
Size
16KB
-
MD5
4e2c807c4d900d0f5315c6b87af00b61
-
SHA1
8f8d8684c99fc7905bc644c9fa5f0e6e3fe6726a
-
SHA256
d8d2c0a6211ddd04e09972bd79d1f06b272c14c238a648402d236d8125e0e5a1
-
SHA512
1fd176da1821de3a0075caeacaf2d5b1254d7dd725c60a3a446b18ed278effdc10192b7288c06dd2bff320d51589a1b01e9f2812918b066e3df59dce0f217e33
-
SSDEEP
384:u7f+7/kW6cGdu/KE0CzgleRQTwz93rWN8:w2rWhC0lWjxB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00090000000230fd-5.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 4e2c807c4d900d0f5315c6b87af00b61.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32\ = "C:\\Windows\\SysWow64\\mst122.dll" 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32\ThreadingModel = "Apartment" 4e2c807c4d900d0f5315c6b87af00b61.exe -
resource yara_rule behavioral2/memory/3732-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x00090000000230fd-5.dat upx behavioral2/memory/3732-8-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mst122.dll 4e2c807c4d900d0f5315c6b87af00b61.exe File created C:\Windows\SysWOW64\mst122.dll 4e2c807c4d900d0f5315c6b87af00b61.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\PROTOCOLS 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\PROTOCOLS\Filter 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\PROTOCOLS\Filter\text/html\ = "Microsoft Default HTML MIME Filter" 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526} 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32\ = "C:\\Windows\\SysWow64\\mst122.dll" 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\PROTOCOLS\Filter\text/html 4e2c807c4d900d0f5315c6b87af00b61.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\WOW6432Node\CLSID\{9f328450-b7ae-4d0c-8a53-2156b0260526}\InProcServer32\ThreadingModel = "Apartment" 4e2c807c4d900d0f5315c6b87af00b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\PROTOCOLS\Filter\text/html\CLSID = "{9f328450-b7ae-4d0c-8a53-2156b0260526}" 4e2c807c4d900d0f5315c6b87af00b61.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 4e2c807c4d900d0f5315c6b87af00b61.exe 3732 4e2c807c4d900d0f5315c6b87af00b61.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3732 4e2c807c4d900d0f5315c6b87af00b61.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 432 3732 4e2c807c4d900d0f5315c6b87af00b61.exe 93 PID 3732 wrote to memory of 432 3732 4e2c807c4d900d0f5315c6b87af00b61.exe 93 PID 3732 wrote to memory of 432 3732 4e2c807c4d900d0f5315c6b87af00b61.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2c807c4d900d0f5315c6b87af00b61.exe"C:\Users\Admin\AppData\Local\Temp\4e2c807c4d900d0f5315c6b87af00b61.exe"1⤵
- Checks computer location settings
- Registers COM server for autorun
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4E2C80~1.EXE > nul2⤵PID:432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5635db9bc08e5ae52d598118c20069424
SHA10456a432afeb4bfca4b5b6cc72e9b7bf99656c1f
SHA256f4ca992f65145e19ba4bede1522d54266e45c6f6c705a08190c8d10625f3bf4a
SHA5120ef83d74bdd634860a70a71134dfefd663c8f7788164596b29161dccd62a3765c20f14667fe48ceaf94190d19435288ae0d008cd875cf360b6694a32f46d783e