Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 10:09
Behavioral task
behavioral1
Sample
d5d95b201227495c3dab01ee5e000bbe.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d5d95b201227495c3dab01ee5e000bbe.exe
Resource
win10v2004-20240226-en
General
-
Target
d5d95b201227495c3dab01ee5e000bbe.exe
-
Size
26KB
-
MD5
d5d95b201227495c3dab01ee5e000bbe
-
SHA1
5e0865463ca153a3b9918adc2f83216afb8ea49e
-
SHA256
6a4d3df650f48473baa137ef73a5a3c2377ba429da3abea0c78986eb93492d9a
-
SHA512
dffd3baf4216584c8604c0ff52099721ae8d1ef5b7034f0991e841e926a2a91e36577d4525c160a4be2620fc5b1874ec7391402cca74ec0a79c5f1fde8f01769
-
SSDEEP
768:/MB9lkHJQtknQDhm2ek74QNC+LQXcbjRw0S5Z:/YwHJIErk74Qo+L720S5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00080000000231d7-9.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation d5d95b201227495c3dab01ee5e000bbe.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 rundll32.exe -
resource yara_rule behavioral2/memory/876-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/876-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00080000000231d7-9.dat upx behavioral2/memory/2044-11-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/2044-13-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SfcDisable = "4294967197" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rescom.dll d5d95b201227495c3dab01ee5e000bbe.exe File created C:\Windows\SysWOW64\golnoia.dll d5d95b201227495c3dab01ee5e000bbe.exe File created C:\Windows\SysWOW64\bitmap.bat d5d95b201227495c3dab01ee5e000bbe.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Ê¢´óÍøÂç\ÓÀºãÖ®Ëþ\bin32\comres.dll d5d95b201227495c3dab01ee5e000bbe.exe File opened for modification C:\Program Files\Ê¢´óÍøÂç\ÓÀºãÖ®Ëþ\bin32\comres.dll d5d95b201227495c3dab01ee5e000bbe.exe File created C:\Program Files\Ê¢´óÍøÂç\ÓÀºãÖ®Ëþ\bin32\golnoia.dll d5d95b201227495c3dab01ee5e000bbe.exe File created C:\Program Files\Ê¢´óÍøÂç\ÓÀºãÖ®Ëþ\bin32\SysComs.dll d5d95b201227495c3dab01ee5e000bbe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3936 2044 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 876 d5d95b201227495c3dab01ee5e000bbe.exe 876 d5d95b201227495c3dab01ee5e000bbe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 876 wrote to memory of 3788 876 d5d95b201227495c3dab01ee5e000bbe.exe 90 PID 876 wrote to memory of 3788 876 d5d95b201227495c3dab01ee5e000bbe.exe 90 PID 876 wrote to memory of 3788 876 d5d95b201227495c3dab01ee5e000bbe.exe 90 PID 876 wrote to memory of 2044 876 d5d95b201227495c3dab01ee5e000bbe.exe 92 PID 876 wrote to memory of 2044 876 d5d95b201227495c3dab01ee5e000bbe.exe 92 PID 876 wrote to memory of 2044 876 d5d95b201227495c3dab01ee5e000bbe.exe 92 PID 876 wrote to memory of 1420 876 d5d95b201227495c3dab01ee5e000bbe.exe 93 PID 876 wrote to memory of 1420 876 d5d95b201227495c3dab01ee5e000bbe.exe 93 PID 876 wrote to memory of 1420 876 d5d95b201227495c3dab01ee5e000bbe.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d95b201227495c3dab01ee5e000bbe.exe"C:\Users\Admin\AppData\Local\Temp\d5d95b201227495c3dab01ee5e000bbe.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\sfc.exeC:\Windows\system32\sfc.exe /REVERT2⤵PID:3788
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\golnoia.dll,init2⤵
- Loads dropped DLL
- Modifies WinLogon
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6883⤵
- Program crash
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\system32\bitmap.bat2⤵PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2044 -ip 20441⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193B
MD5131d8fd1294a1a9afc14140f5d9fea46
SHA185d0cfa3d165ca5267dba35ce24db25196b85b82
SHA256a7aaecfc75ce131a12df834efa8a4fd6cfcc9504c5877b0656fe4d531d63471e
SHA512450ad669acc91733139faf10c60196fb2a270fbfc9b9bb3ef6eec65229e18a3e609d5080648964d337ab1ffad8ae70c9aba79d97550d10ffafa74c6d368194b2
-
Filesize
14KB
MD5157582aa8ec44b5c32c8d7fdaf053130
SHA14c308bfc65c8db5c71bac4ff1a16e3a41a18f8b5
SHA256e333a82075edb15a1cffaff7557830e94a30620badf3ab2828fbfd7e7d21173c
SHA512b4313e84ac49dc0c72d1508b4154e76ed7d57feb52a05ba8fc79d21d70afeefbbff0a991dbb8489653a9acdf4e7285162204973858f4632fa473a55f4092a4a1