Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
8956c5c90ff841df626b0e41131b67b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8956c5c90ff841df626b0e41131b67b8.exe
Resource
win10v2004-20231215-en
General
-
Target
8956c5c90ff841df626b0e41131b67b8.exe
-
Size
245KB
-
MD5
8956c5c90ff841df626b0e41131b67b8
-
SHA1
30e78b0d44a73eeef63670d15b2c5c3c8c2b565f
-
SHA256
23abd1bc3a2a3648bb065eef6c57ef75b23d3509a1e026b5e5f0b13910935c9f
-
SHA512
9d125f2b329015eb2eaec0ea3a6a1b8a9f1d4c9cb11982c1a3aaea53d96de9ad49656b632f515d613ea87ee7fbcd7b27f40f628efdd9a023d97c033d03906b57
-
SSDEEP
6144:rnKD7cU3EVwcH0Ay5/MbUn36g/vsAdRKBrK26g0O/3Nx:rnKDFKwZAyVp3fvvRGsghdx
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000600000002321b-4.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1456 DbgStart.exe -
Loads dropped DLL 1 IoCs
pid Process 3596 Regsvr32.exe -
resource yara_rule behavioral2/files/0x000600000002321b-4.dat upx behavioral2/memory/3596-6-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\AVDebugPrv\DbgStart.exe 8956c5c90ff841df626b0e41131b67b8.exe File created C:\Program Files\AVDebugPrv\MSOAntivirus.dll 8956c5c90ff841df626b0e41131b67b8.exe File created C:\Program Files\AVDebugPrv\debugprv.dll 8956c5c90ff841df626b0e41131b67b8.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\msoantivirus.MsoTest\Clsid Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\ProgID\ = "msoantivirus.MsoTest" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\AppID = "{F586EF8D-C891-1D89-DF68-680EB8036BA8}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{F586EF8D-C891-1D89-DF68-680EB8036BA8} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\msoantivirus.MsoTest\ Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\msoantivirus.MsoTest\Clsid\ = "{F586EF8D-C891-1D89-DF68-680EB8036BA8}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\ProgID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\ Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\msoantivirus.MsoTest Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\Implemented Categories Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\ Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F586EF8D-C891-1D89-DF68-680EB8036BA8}\InprocServer32\ = "C:\\PROGRA~1\\AVDEBU~1\\MSOANT~1.DLL" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories Regsvr32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3620 WINWORD.EXE 3620 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2832 wrote to memory of 3596 2832 8956c5c90ff841df626b0e41131b67b8.exe 85 PID 2832 wrote to memory of 3596 2832 8956c5c90ff841df626b0e41131b67b8.exe 85 PID 2832 wrote to memory of 3596 2832 8956c5c90ff841df626b0e41131b67b8.exe 85 PID 3596 wrote to memory of 1456 3596 Regsvr32.exe 86 PID 3596 wrote to memory of 1456 3596 Regsvr32.exe 86 PID 3596 wrote to memory of 1456 3596 Regsvr32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8956c5c90ff841df626b0e41131b67b8.exe"C:\Users\Admin\AppData\Local\Temp\8956c5c90ff841df626b0e41131b67b8.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Regsvr32.exeC:\Windows\System32\Regsvr32.exe /s "C:\Program Files\AVDebugPrv\msoantivirus.dll"2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\AVDebugPrv\DbgStart.exe"C:\Program Files\AVDebugPrv\DbgStart.exe"3⤵
- Executes dropped EXE
PID:1456
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD54645113bbb13ca12d1c85d7c1c063fe7
SHA1e67df7ea80b92ffb3074179c1a0c28c063aaef00
SHA25614d28939febd334b95a0ff5addb6d0bafec5a9a94f6737df691ccd40bad99872
SHA5127ae6a630f035041630283f9a355b306e90baa9e4570cfd79aa5e6e303537d4edf2e84ed42b432f15b9650a9901cbbefac8d8bf2ebe3b9afb79c0ee28c1bcd5eb
-
Filesize
169KB
MD52fa0941fbf4536dfe1aad5384419b48c
SHA1d2f9e14bcbf652401e5c12c6786e31c78c5be877
SHA25613e2b1b31df2604da83dc86778c91866cc82fd1372ce84d763c68ee5078af7da
SHA512a7bc6c82a639a84ce4d5f04c1e5b95551240995185f3f7695f089eb6ef13765185c0573a61d9bb445da82a16f0e0fdc147f24facf727de32cc71b26ecb265768