Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe
Resource
win10v2004-20240226-en
General
-
Target
bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe
-
Size
2.6MB
-
MD5
e23030a6862e651b242dd3fa113131dc
-
SHA1
544d10c39b57691daa22390f2ea1c00448272182
-
SHA256
bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50
-
SHA512
2901e3363d8792494ee441786969907169e0400048836500eb1affe7d5dfb435815aafb2a8dd6783fdf0b839148582a639c2de219ad41ac94229f74e9e0f4fd4
-
SSDEEP
49152:wnH3qnGeO8p9g0RWYDI9NmQ3+Xa9ftxJEzmh8ezDJFpkCHI8IaGrpeJH2o:hpOY+NmQ3ZFtjEilD2Co8X
Malware Config
Signatures
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c0000000133c1-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2020 bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe -
resource yara_rule behavioral1/memory/2020-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x000c0000000133c1-1.dat upx behavioral1/memory/2020-101-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-106-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-133-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-155-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-165-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-199-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-227-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-283-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-303-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-321-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-333-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2020-337-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\symsrv.dll.000 bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe File created C:\Program Files\Common Files\System\symsrv.dll bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2020 bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe 2020 bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe"C:\Users\Admin\AppData\Local\Temp\bf291778e1447bd3065c2ea5bf49433035bf91720144ad9fa843a6f68b99cb50.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab