Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
96f00f7bc2bddb1f08983242dab8b0d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96f00f7bc2bddb1f08983242dab8b0d1.exe
Resource
win10v2004-20231215-en
General
-
Target
96f00f7bc2bddb1f08983242dab8b0d1.exe
-
Size
51KB
-
MD5
96f00f7bc2bddb1f08983242dab8b0d1
-
SHA1
b7c2c2328cb745137cf717524a41c717cc7b180a
-
SHA256
7150b18edd48917f35a4f2a8176f6adc382ec19ec14f89d86a07759965ebb7f1
-
SHA512
e9d5d8df7f6bb1befc5be0bd10188ae7844f71f393d947a6d022b4dc4a87ccef092dc2c66160cb88a65ce6353723bc91ca722c4c0d49aaa69bb7f56cd15e95a0
-
SSDEEP
1536:Nj/kKcWVvBOeDkuubz2L2yCgj1NxQFloO4P:ZsKccnkuOaqexNxQUO4P
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000152bc-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe -
resource yara_rule behavioral1/files/0x000b0000000152bc-2.dat upx behavioral1/memory/2516-4-0x00000000003C0000-0x00000000003D8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\loadMect1 = "C:\\Program Files\\rundll32.exe" 96f00f7bc2bddb1f08983242dab8b0d1.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ct1dll.dll 96f00f7bc2bddb1f08983242dab8b0d1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\rundll32.exe 96f00f7bc2bddb1f08983242dab8b0d1.exe File opened for modification C:\Program Files\rundll32.exe 96f00f7bc2bddb1f08983242dab8b0d1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe 2516 96f00f7bc2bddb1f08983242dab8b0d1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f00f7bc2bddb1f08983242dab8b0d1.exe"C:\Users\Admin\AppData\Local\Temp\96f00f7bc2bddb1f08983242dab8b0d1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5fb0b3e9eb684907a6a21f6bff3852037
SHA19e16a8c26cbba086f6246f3d29e9a2a4817d7055
SHA2561de6fda25443b79e2b1bb56a8444cefe8c164a90114b26103bc3f025a4bec913
SHA51256e30bb080459686471e808057ed01a725d59ad48ffee74d66fedee2be3b0571614b69fc183056c36149d94a775204166170681f56bec3274b3e5f1b3977c407