Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
c68448290762a083b43861326b1de4b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c68448290762a083b43861326b1de4b0.exe
Resource
win10v2004-20231215-en
General
-
Target
c68448290762a083b43861326b1de4b0.exe
-
Size
686KB
-
MD5
c68448290762a083b43861326b1de4b0
-
SHA1
668b8120b03f9d3f59f3ef8ca8e1362ea3ca50c3
-
SHA256
78a4a2da7e438d1ba80d924ac5c74bb0923bf8864264caf22c79fbcb97b7919d
-
SHA512
5ed9afb7b0d00aafa9023a307370e96ea3c7eae2af04f36ad419898aceb117130ba93186583e25315ebc2a1f90781bb3692f32fad998e0ce00ead5d56f3389fc
-
SSDEEP
12288:fvQNOZU/ebKdVrSsPqifmUfe1JqUMKiaTrBpsYu/l31Wc5VvQMCXHPS+OJy7d:fvUHmbeVmsP3uCUMKxrnE9v23Psy7d
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00090000000231e9-4.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1492 Wozscvsns.exe -
Loads dropped DLL 6 IoCs
pid Process 2884 c68448290762a083b43861326b1de4b0.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 2884 c68448290762a083b43861326b1de4b0.exe 2884 c68448290762a083b43861326b1de4b0.exe -
resource yara_rule behavioral2/files/0x00090000000231e9-4.dat upx behavioral2/memory/2884-5-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/1492-20-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/2884-36-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/1492-47-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Wozscvsns.dll Wozscvsns.exe File opened for modification C:\Program Files (x86)\Wozscvsns.dll Wozscvsns.exe File created C:\Program Files (x86)\Wozscvsns.exe c68448290762a083b43861326b1de4b0.exe File opened for modification C:\Program Files (x86)\Wozscvsns.exe c68448290762a083b43861326b1de4b0.exe -
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Wozscvsns.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31094127" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3937142755" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31094127" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094127" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{158AE6E1-E163-11EE-BD28-FAD2FAC7202F} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Wozscvsns.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417117593" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Wozscvsns.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094127" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3938705302" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3937142755" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3938705302" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2884 c68448290762a083b43861326b1de4b0.exe 2884 c68448290762a083b43861326b1de4b0.exe 2884 c68448290762a083b43861326b1de4b0.exe 2884 c68448290762a083b43861326b1de4b0.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4840 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2884 c68448290762a083b43861326b1de4b0.exe 2884 c68448290762a083b43861326b1de4b0.exe 1492 Wozscvsns.exe 1492 Wozscvsns.exe 4840 IEXPLORE.EXE 4840 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1492 2884 c68448290762a083b43861326b1de4b0.exe 85 PID 2884 wrote to memory of 1492 2884 c68448290762a083b43861326b1de4b0.exe 85 PID 2884 wrote to memory of 1492 2884 c68448290762a083b43861326b1de4b0.exe 85 PID 1492 wrote to memory of 4840 1492 Wozscvsns.exe 86 PID 1492 wrote to memory of 4840 1492 Wozscvsns.exe 86 PID 4840 wrote to memory of 2856 4840 IEXPLORE.EXE 87 PID 4840 wrote to memory of 2856 4840 IEXPLORE.EXE 87 PID 4840 wrote to memory of 2856 4840 IEXPLORE.EXE 87 PID 2884 wrote to memory of 228 2884 c68448290762a083b43861326b1de4b0.exe 88 PID 2884 wrote to memory of 228 2884 c68448290762a083b43861326b1de4b0.exe 88 PID 2884 wrote to memory of 228 2884 c68448290762a083b43861326b1de4b0.exe 88 PID 1492 wrote to memory of 4840 1492 Wozscvsns.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68448290762a083b43861326b1de4b0.exe"C:\Users\Admin\AppData\Local\Temp\c68448290762a083b43861326b1de4b0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Wozscvsns.exe"C:\Program Files (x86)\Wozscvsns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4840 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""c:\c68448290762a083b43861326b1de4b0.exe_And xMe.bat""2⤵PID:228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29.0MB
MD5a48127cad17fc20b228e172430e37e25
SHA1b02a03fc0e3762e4e96af15425b38ce1102b3bdc
SHA25672992bcb20d743838e9bb343253bb4425f375648fdce717b592c7f2a5b3e13e4
SHA512a6bcc335a2c5247e46cb8d1af60725b64811ab36c43ee52bb206369fe0d5aac5dcfa9639789a12e782371d5ec6c7ad6a9207d50500f20f8c6793d79a05079f31
-
Filesize
38.4MB
MD5eca9ad9367939d644886f3e237af50be
SHA16a575a59d9c5e0fdaf931c034e3e68d3d28200f4
SHA2568bce3ae7d25f1b48b0a762cc4a2ac97d35cf12edca092599100ed1986532482d
SHA5122d1c1b02294f4d7dea2d126f2092c343ad8538088b29e5058003378b8c300534fb67ef11477a6cfd6e1ca155141eaa24eb750d5aba982ad313c199f4cc4dd1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5933b881e04584122e8cd768def29fe6a
SHA19877fedd4896d75f3605bf981c9e90d6d5e60a14
SHA2566c1579aabb1cf90ec423f624a4d858bf2c22387ca34527ebd5be8611d52f50ef
SHA5120fea464dec8c086b89485eccc240c455ab4b87daee80d9fcff6444338375d11b610bf5f5ea9ea5ab3a6bf1994f7bb3895b709f5135152c0abd62b1c97504f835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD52a495c40170988b583f2b0f2715c88f0
SHA1e2381dda3d8f2abf499a6812e512433a741a9149
SHA256868c1e40dfa117ac2276d7c0c6c6f3d9a147720325cda5eb1377366dfc343f78
SHA512b8f58800cf4e2c068a2a012099234604cb9b9e3710ee99e9d79afe369140f26ae242d1b08ed06c495c6117f7fcd5555bc079584c1ec08cec8119c88c9c18a997
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
409KB
MD5c3d354bdf277263b13dca264ec2add9d
SHA1b428dfd7df0f6024e22838823cc702e2293bd314
SHA256ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f
SHA51224c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e
-
Filesize
182B
MD550ac0b8e5a2800382ec15544bc8bcb02
SHA1e8dbb7ad79b94e9d1b62893aad361fff62d5fd07
SHA25621d37d1f53504222c7380e8002cba117b128c2667d0f26d7a2c6d73c2e771fff
SHA51230e091b04baf4683f1f623db91de77e4928286dac06dd4dac23110b4e3cf877447acc70214a42b067e072c1779fcc6ec9cf67b87b1d4ee09ce7367630bc437f6