Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
8ac7f8c4d6db728d966a7bbbfe7e4d29.exe
Resource
win7-20231215-en
General
-
Target
8ac7f8c4d6db728d966a7bbbfe7e4d29.exe
-
Size
978KB
-
MD5
8ac7f8c4d6db728d966a7bbbfe7e4d29
-
SHA1
140030fc9beef7fba040385f60c775f705d540db
-
SHA256
75fbd818e4414d4d124393d19dd05399009edc95d4facca10e95ff51079d1160
-
SHA512
102760e5ac067b30bfe0368fc6af940c9fcb8507d5968c5869cfb2bf20d759c3ae4a11a293e47c6359e76331752891cbbecb3f556bc9d6efdb672fde05aa2ae4
-
SSDEEP
12288:Yr6JTZ1U5YwJJcO0/ADquV53dsXZP2y4wz+QLc7eDziMZdIYdexhxgLBNL1qPadD:fJ/cCbv+vx3xifQkiPMz
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000600000002321b-17.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe -
Loads dropped DLL 1 IoCs
pid Process 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/944-6-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/944-10-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/944-12-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/944-13-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/files/0x000600000002321b-17.dat upx behavioral2/memory/3644-22-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/944-29-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5004 set thread context of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 944 set thread context of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe File opened for modification C:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31086125" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203e63e32d56da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31086125" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f2859d464fb564ea9e97dd009a434cc000000000200000000001066000000010000200000008845349cd9ef6ec5c59be0ff595f72c7c21d36864c765f3758d35912819f3486000000000e8000000002000020000000e46627ff5b88d4d61b0735d3953568c9b935ab9a43ba6ea23d4c9cf9bdd099b320000000544873c7ad607cc91c7e0b7057eecfac94f6569c1c1428f915e1a9b50eb1e03b40000000f9d2685ba04a4039a9c8d4cc8554f0c5f5b92c79c753254d6841fc8a43aa8e709e187c2805a371b88fc8dafa29dafd2ca33ca667e705c5ac8724d8d38974acca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f2859d464fb564ea9e97dd009a434cc00000000020000000000106600000001000020000000b5e2900fcdac7499a548f5f7c97fed6fa8e92ec8a00cb5996808e5b8db7950d2000000000e800000000200002000000011a62ccadfbe4188368e9e9e854ce172ccfc0fd7d0a8ceac2c8bcf3738cf9ed320000000391b112d30f2f7e42e3fbf6e97bdf908690ecb730cde03bd16311a5ecb07c90d40000000ecb1a9e5f9b09689d82c97f8f255476cb00f04a59297a5b7b2d8ce55f108dfd69e26752e2ac8677f21f8579401f9f5534097019713d7e27ca696ea3b262b2a69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413680745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3794003482" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0D3738CF-C221-11EE-BCD9-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31086125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3785409311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704444e32d56da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3785409311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3644 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 3644 iexplore.exe 3644 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3056 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 83 PID 5004 wrote to memory of 3056 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 83 PID 5004 wrote to memory of 3056 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 83 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 5004 wrote to memory of 944 5004 8ac7f8c4d6db728d966a7bbbfe7e4d29.exe 84 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 944 wrote to memory of 3644 944 updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe 89 PID 3644 wrote to memory of 1272 3644 iexplore.exe 90 PID 3644 wrote to memory of 1272 3644 iexplore.exe 90 PID 3644 wrote to memory of 1272 3644 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac7f8c4d6db728d966a7bbbfe7e4d29.exe"C:\Users\Admin\AppData\Local\Temp\8ac7f8c4d6db728d966a7bbbfe7e4d29.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exeC:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe2⤵PID:3056
-
-
C:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exeC:\Windows\updateTaqSRhXZRqTxveSmdUisbaOOpxKmGl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Internet Explorer\iexplore.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3644 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5cb99b6d5040641081530ef8f6049f1aa
SHA13fa9e3148cbee0e561da3787919043483ee5e5c0
SHA2563e1607026f332ae19539f0621c8b18c820245d196febf8bf258253667ebc94d8
SHA51213cdc5995fa4741d474c00491ea55b26101a88ee3495327950249e8bef1e16de29f46d0c1ffef3682eac0e041f0b06545d51ef8152a33606f0e13fe35e6a1d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5af685399e69eb2a9954e3a15f0ae3c76
SHA14f9e9061f1c9466fdaab3988bfef3ef6565eb94b
SHA256ff04453445aa7307b252aa576498e7492432f7fa683fa5c53236ca3287591c21
SHA5120bc8bbf0bd4f429ea8cefe5376900e1176cabe0a2df80b1bbf3b59aee1cf7ce993d27c8652766e2e95b37d00d03f707dff03d8de30421b8da3b26af773448868
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
171KB
MD5744dcc4cbbfbb18fe3878c4e769ec48f
SHA1c1f2c56ee2d91203a01d3465f185295477a1217d
SHA25633eb31a2a576e663474a895ff0190316c64a93d9ce05a55df0d53f9beeb61163
SHA512706630be2ca09e574a7794e32e515a0a3f993643d034647b8cb976c1e7045e87e30362757cc65fcdb95f4a4327f0dcda3edc82ba84e5ed9115870a037e13af21
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34