Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
b7e527e572d6abb99dd0a02820828d29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7e527e572d6abb99dd0a02820828d29.exe
Resource
win10v2004-20240226-en
General
-
Target
b7e527e572d6abb99dd0a02820828d29.exe
-
Size
352KB
-
MD5
b7e527e572d6abb99dd0a02820828d29
-
SHA1
5b6d1da284a9446338a8e0252d4c6aaed7da6f98
-
SHA256
f37e231d9fca43ebf0745a01769cedd64f9df3d0c8c50cdce8c6cd535a0e4482
-
SHA512
ec71163fb3956f9681a27f4c4495239f265a2741773f06de653ec676d5bf414543da2d8d6daade4a9f00db82967714e06be3e8925d1363c5af91f19eb61fb03f
-
SSDEEP
6144:pMK5fKXKtphMsIs3msTiHe10ceqKMLGbpzhvUZi98gWNlPTGQQm6agrd:pMKtKX8hM+TTekGB5oNtTird
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023214-34.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation b7e527e572d6abb99dd0a02820828d29.exe -
Executes dropped EXE 2 IoCs
pid Process 3812 1.exe 3012 sdfsdfsdf.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 sdfsdfsdf.exe 3012 sdfsdfsdf.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\KeySpy.dll sdfsdfsdf.exe File opened for modification C:\Windows\SysWOW64\KeySpy.dll sdfsdfsdf.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\sdfsdfsdf.exe 1.exe File opened for modification C:\Windows\sdfsdfsdf.exe 1.exe File opened for modification C:\Windows\sdfsdfsdf.cfg sdfsdfsdf.exe File created C:\Windows\sdfsdfsdf.cfg sdfsdfsdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\sDate = "-" 1.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International 1.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.Default\Software\Microsoft\Windows\CurrentVersion\Internet Settings 1.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodial = 00000000 1.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodisconnect = 00000000 1.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International sdfsdfsdf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\International\sDate = "-" sdfsdfsdf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 sdfsdfsdf.exe 3012 sdfsdfsdf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 sdfsdfsdf.exe 3012 sdfsdfsdf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3812 1424 b7e527e572d6abb99dd0a02820828d29.exe 87 PID 1424 wrote to memory of 3812 1424 b7e527e572d6abb99dd0a02820828d29.exe 87 PID 1424 wrote to memory of 3812 1424 b7e527e572d6abb99dd0a02820828d29.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e527e572d6abb99dd0a02820828d29.exe"C:\Users\Admin\AppData\Local\Temp\b7e527e572d6abb99dd0a02820828d29.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Control Panel
- Modifies data under HKEY_USERS
PID:3812
-
-
C:\Windows\sdfsdfsdf.exeC:\Windows\sdfsdfsdf.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD510a3dbcb3a714de2187dec1cfb0d4f9e
SHA1fc58aa2afdde837df3ee86986595c717dda849fb
SHA2563716ad0687ab5868947c7460bcb5c7e75bbbabbc3e06f447b5df146e83357dd4
SHA512509d07de9b985ef680fbc66998eb130cce3293ecceb80a4509514c84bc5c082b414a6dcca9af7facef4ee814b34b1e030f94978b4688380dd0c121a71c0b12bf
-
Filesize
11KB
MD5373ddfe5e3e49a265fc6761d064d6dff
SHA1cd812b409144f1439bf7da081251086f30c5af23
SHA256d7d005d3cdc5f0d2a6523db9bafe07405347e27ccdcc581f3d504b1f77d933ce
SHA5128b13264df53219598930ed95959fa096da80a2008e93a891830cd045ddf1014f0a5f186ab61f035ce064ee79a78912f2f2f2d943846dfbd3d810dc47463972f2