Analysis

  • max time kernel
    93s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 14:51

General

  • Target

    976b2261b26fba5e57dfa2c9d3a6aeb8.exe

  • Size

    84KB

  • MD5

    976b2261b26fba5e57dfa2c9d3a6aeb8

  • SHA1

    38f553e9fec6c84ced36918a506b458b024e0234

  • SHA256

    ac5ae6ddc2d68524c4f41b0327a9510767a44747582992cb57744d23d895f841

  • SHA512

    90d24765f1640e0ecd3045cb20e4621e942f7227d7083e2a0b6fc45a8ce71400a828aecf218fc5159b3d1860b93423cfd9437173e3f0e98d6243656c2d8a3fef

  • SSDEEP

    1536:T727NGtQkU3HlNuYOD0cWENIlCjNpapX5xBt7Yw0pewn8+8:HUNGtk3FNutD0cWENIyNpa5bzkSt+8

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Program crash 1 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\976b2261b26fba5e57dfa2c9d3a6aeb8.exe
    "C:\Users\Admin\AppData\Local\Temp\976b2261b26fba5e57dfa2c9d3a6aeb8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\ntdll64.dll
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:836
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\BhoNew.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 528
      2⤵
      • Program crash
      PID:448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 4988
    1⤵
      PID:1040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BhoNew.dll

      Filesize

      13KB

      MD5

      483cdecc7d2cb80dbcf64d76dd8fcc47

      SHA1

      3914952632af666ef019c0cabcb25734104a1012

      SHA256

      a4672b9a2f91dc3b2e2955292b62dba30a5685a66e3772816fb9a2d5ab109baa

      SHA512

      4aeeff2272e235115e8a38ef8830d04d4d750770a0dd43d11f69657fc2b686a0cc686ceaaf37d787265659bb011220ee09d6a0b5f141f25be676691181ba8406

    • C:\Users\Admin\AppData\Local\Temp\ntdll64.dll

      Filesize

      40KB

      MD5

      f41108e4bf007b986041b808c998a0c8

      SHA1

      7d1d4ff5d6573528a0b41749c8aaa432f22212c4

      SHA256

      4f4c3e506e22ab4c6d48a15a2306ded9e529aadfc854d66b0bebb4de20e772df

      SHA512

      ba0f195487a27bf4297e2cf09b4aebcac9212cff7521a86c54dc292c4f7051d5b22633431c8a38de624974a431cb92a783e59c61baf4d1a711bb4d47447d9372

    • memory/2168-6-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB