Overview
overview
10Static
static
10030cc39033...e8.exe
windows7-x64
9030cc39033...e8.exe
windows10-2004-x64
9$PLUGINSDIR/DL.dll
windows7-x64
1$PLUGINSDIR/DL.dll
windows10-2004-x64
1$PLUGINSDIR/IS.dll
windows7-x64
3$PLUGINSDIR/IS.dll
windows10-2004-x64
3$PLUGINSDIR/NET.dll
windows7-x64
1$PLUGINSDIR/NET.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
9$PLUGINSDI...ON.dll
windows10-2004-x64
9$PLUGINSDI...ze.dll
windows7-x64
9$PLUGINSDI...ze.dll
windows10-2004-x64
9Analysis
-
max time kernel
160s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 18:29
Behavioral task
behavioral1
Sample
030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DL.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/IS.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/IS.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NET.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NET.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsResize.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsResize.dll
Resource
win10v2004-20240226-en
General
-
Target
030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe
-
Size
732KB
-
MD5
22a3aa4b35a54012facbddd206f008f9
-
SHA1
f9376f72ff579cee4c00eba26e56177c00b916d2
-
SHA256
030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8
-
SHA512
6800688449aea723322afe651626d5069a50106cda201e65340479e5c6cf5dc17709cd3ef650ad2dd0478f1ac4dd9fddc64c7bae37cd7a144c452b86b6dab03c
-
SSDEEP
12288:j0gsaGle5IGICmMwHW0MB3ybbhGNWVCOlO/ohLftqacu3pS:wvaUG+9e3yGN6vcu3
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/files/0x0007000000023261-14.dat UPX behavioral2/memory/5112-17-0x00000000747A0000-0x00000000747AA000-memory.dmp UPX behavioral2/files/0x0008000000023263-31.dat UPX behavioral2/memory/5112-43-0x0000000073650000-0x0000000073659000-memory.dmp UPX behavioral2/memory/5112-62-0x0000000073650000-0x0000000073659000-memory.dmp UPX -
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023261-14.dat acprotect behavioral2/files/0x0008000000023263-31.dat acprotect behavioral2/memory/5112-43-0x0000000073650000-0x0000000073659000-memory.dmp acprotect behavioral2/memory/5112-62-0x0000000073650000-0x0000000073659000-memory.dmp acprotect -
Loads dropped DLL 11 IoCs
pid Process 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe 5112 030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe -
resource yara_rule behavioral2/files/0x0007000000023261-14.dat upx behavioral2/memory/5112-17-0x00000000747A0000-0x00000000747AA000-memory.dmp upx behavioral2/files/0x0008000000023263-31.dat upx behavioral2/memory/5112-43-0x0000000073650000-0x0000000073659000-memory.dmp upx behavioral2/memory/5112-62-0x0000000073650000-0x0000000073659000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe"C:\Users\Admin\AppData\Local\Temp\030cc390337b82004a72f413bb49456bdd2fb55f553bab7b60180cbbdad38de8.exe"1⤵
- Loads dropped DLL
PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2660 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5194dcc4b0a5ad6b6f7c1f166d96c4476
SHA1fb0390ac1e04a66f284adbd0af6e809bf5b0792e
SHA256643e7fd4591d117c43515efc93d4ddbaf0879b14403531147f4c34a49275ffd6
SHA5124161da2fddcd0561237082c639716aca566a7755dd0589c5b5d63d436dbb7df5838d2a7c8c11cbd74346d678cdb4c5b8022f78855f6a9613b17be9a47487af51
-
Filesize
92KB
MD563834ec07c42859db4ebef4947046d50
SHA1ea9551cba09926ae639c0ba93479049fc060af4c
SHA2561bd3438268e3a8e6060ec607e503714805657d01b3a35fea289f2624ff3265c0
SHA512972b8ecfa0ba2bae2f7ed269f66a11a90dfc45435f916bfee58ce493fb244b0b077412260390cf43adf64098f2771daabdd3541e2350137f450423d8c119503e
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
9KB
MD54ccc4a742d4423f2f0ed744fd9c81f63
SHA1704f00a1acc327fd879cf75fc90d0b8f927c36bc
SHA256416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
SHA512790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb
-
Filesize
7KB
MD578b913fcd04259634a5e901c616e6074
SHA1ad5e1c651851a1125bcad79b01ccdcfa45df4799
SHA256e3ce60666bb88c2412615ef9f432ec24e219532dee5cc1c7aebc65ed9ec94d59
SHA512cbe07179dd93011f3d9a8f83541961ff34fb83d96658ac82a433ef0aa3399b183eaec3e6a49ec1c1e478d1eada2d3ebc78ffb1ae0574984ae66a7a9cab5d59e5
-
Filesize
4KB
MD5a8655e0ca9e079edc631838273afc087
SHA120c4468e90f961c499870cfa6a179c82f6d72675
SHA256eeb2705599c3075e652762e74c88d3cb482e01ad8cae65f02022f91aebf13cb5
SHA512383201fc7f0d15f0d02ae638e411becac61eb5f475020220035ba6df560aee23cbb90082e6827aeaba434e150c08df87914e3cea308ed197f86d560eacc369e1