Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe
Resource
win10v2004-20240426-en
General
-
Target
42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe
-
Size
10.5MB
-
MD5
f9a29153cf6076a51af0c9a7010cb5ef
-
SHA1
ed4f80338bb8c791bb8c564e9150f5abbabef3be
-
SHA256
42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59
-
SHA512
f2afe7213d743483cc1efc4bafb9b80a6642c7bf808a32a80ea9a8e358cdffed4401848dd91fb96e4a1ffe3d3d8d98df12b6bcf222fe296b3e299ecc069f20b0
-
SSDEEP
196608:cdb1jdnJliBrgU6LT5eMRwwRUnprfiLCMeOPAMp7RFCy8:QJhqrfcT0MRwwRUprfXLOoQ7RFY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b00000001472f-50.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe -
resource yara_rule behavioral1/files/0x000b00000001472f-50.dat upx behavioral1/memory/2868-58-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-68-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-69-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-74-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-75-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-77-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-80-0x0000000072F50000-0x0000000072F89000-memory.dmp upx behavioral1/memory/2868-85-0x0000000072F50000-0x0000000072F89000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe 2868 42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe"C:\Users\Admin\AppData\Local\Temp\42b98730f500887d90c1cc67ba7aa48ec1e2e766e8bf1e8722c7fb413a78ba59.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5be702be6be99ad2203d50516014e5cd9
SHA1b4842827e5bc9de24e74d5b08afa0675df570dba
SHA25602bb80610621625b0c420a9fc8ba32efeef4b859b327aaa0dfb62da38abbf41c
SHA51279cfb96a73ec2b8341c59580f7ecd5db53b5023e41acad47e6e8bd8350532d1c4dcb04c1e62bbf3bd149b1779ed904b271bb1b9fb23c6fed1752ade43239f9a8
-
Filesize
80KB
MD5b220f0b3057a925147f57c5ebff51523
SHA1bb9faca3b0e9f849301ecbd58381e7965a143781
SHA256f12af891c0c1cb5e793ab260ff92e9792c8f7f2541162390a44c27e2e954dcb8
SHA5121e9fb6bd6005aab4f553b0a02c373671ce26fa773b06461e0041cfad0ae62bbf319105296ebd5e2c1ccf1c478ce17510aeb32dab8b83254fa2a18c9148f121f1