Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 14:18
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20240426-en
General
-
Target
source_prepared.exe
-
Size
7.1MB
-
MD5
a256c2e15e8f49b4df4d5def951d4ea8
-
SHA1
50f32d65df4722991463ea7bffc6bd3a2939c306
-
SHA256
b557839f4cbd5619a508e85ead1e99fcc56cead43ef1b817ee083ccac0ca3db7
-
SHA512
632a36234529fad1eb0030861376c971a7eaee5e4d08f7c4c00dc80e5f8fe09d726431c22790c1cc3721e6a5f382060304d54cbad9eadf393a68beaaeaee7106
-
SSDEEP
196608:VdMymH0n/tS2VAVe68/vkMUUdJ+P3+NxDppx:rMyucA2urSH+P3+NDp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 20 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI42282\python38.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ctypes.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\libffi-7.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\libcrypto-1_1.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ssl.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_hashlib.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_sqlite3.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_socket.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_queue.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_overlapped.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_multiprocessing.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_lzma.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_decimal.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_bz2.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\_asyncio.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\unicodedata.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\sqlite3.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\select.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\pyexpat.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI42282\libssl-1_1.dll acprotect -
Loads dropped DLL 6 IoCs
Processes:
source_prepared.exepid process 1812 source_prepared.exe 1812 source_prepared.exe 1812 source_prepared.exe 1812 source_prepared.exe 1812 source_prepared.exe 1812 source_prepared.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI42282\python38.dll upx behavioral1/memory/1812-34-0x0000000075230000-0x000000007562C000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ctypes.pyd upx behavioral1/memory/1812-39-0x0000000075170000-0x0000000075192000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\libffi-7.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\libcrypto-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ssl.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_hashlib.pyd upx behavioral1/memory/1812-60-0x0000000075160000-0x000000007516C000-memory.dmp upx behavioral1/memory/1812-63-0x0000000075150000-0x000000007515F000-memory.dmp upx behavioral1/memory/1812-64-0x0000000074EF0000-0x0000000075142000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_overlapped.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_multiprocessing.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\_asyncio.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\pyexpat.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI42282\libopus-0.x64.dll upx behavioral1/memory/1812-69-0x0000000074EF0000-0x0000000075142000-memory.dmp upx behavioral1/memory/1812-68-0x0000000075150000-0x000000007515F000-memory.dmp upx behavioral1/memory/1812-66-0x0000000075170000-0x0000000075192000-memory.dmp upx behavioral1/memory/1812-65-0x0000000075230000-0x000000007562C000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
source_prepared.exedescription pid process target process PID 4228 wrote to memory of 1812 4228 source_prepared.exe source_prepared.exe PID 4228 wrote to memory of 1812 4228 source_prepared.exe source_prepared.exe PID 4228 wrote to memory of 1812 4228 source_prepared.exe source_prepared.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\VCRUNTIME140.dllFilesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_asyncio.pydFilesize
29KB
MD57703a42fb1f1f3afb50aab029ff3da94
SHA1d7413fa82fc9ec998d80900a12a2256b2730b488
SHA256c57d57c5cd943726705e131a81061ccda7b8b7e9ed4ac511a819abd181e89864
SHA5127447e04236e2d3d77cd1489d2c10f2c8b95cbd7ec3f78d172c255dcaefc951ed4fc6e8d54580f67066d51b84edcfbde7016a52a85530023eec3cd79b847564e6
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_bz2.pydFilesize
41KB
MD5b5fe02c90a8dab9bf1def31356d4d404
SHA1111cf8f6da1856d042dadc354fca41253c07a980
SHA2560838679e8c3680a94b9e980b16ad894c20bd0782efdb5cd24bb925cde5da1346
SHA512ffe4e0f979f0762588f6fc99b4d32285290a3990bd5d4c5e9f7d6838468e31b09beafae30018a6e06709bfd0fc9046b07976ef8085a4c5c1781cdae6bd581370
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ctypes.pydFilesize
49KB
MD522363de575467d30e94b1ebd77dbde97
SHA139c1d0ac327f2f006d846aa1156eb96d742f9d8d
SHA2567c49383319c1d970348b6a86302373cdc0a20fffeca1468abcedd90e83dcfa34
SHA51296f3e499ba548c86fb25249a9b2fae92594d1a1a1c43752223ced65529a7c8bdbcebae620bd5a52afa7b48acc0ee2b3380b0711194a1ca19f8b090e3e37b86a0
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_decimal.pydFilesize
81KB
MD59c595179a352d128b181b57f521d3ef4
SHA1379c731913ec4a9dd434cf538104f2c540e3affa
SHA256e155fb86adce526de7c598ae3e071c062086e438050ed1ff47b1cea4b9da4f02
SHA512ee43d64d195cee1011e8da0b3de85f662a36716642ec5bc017c8c0b79b8f166c8d7878da173c4435cbd32f21ec71675776e1e31e23659ece3193f853ebe814fb
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_hashlib.pydFilesize
23KB
MD5d37bb357a6925c850e33d11aabd801cd
SHA19ac215dca21675fab0b9cb91ec49ab8517dfecf4
SHA256c1cb1bc088be544232512a5965d0134ddcf8961799ef756a73c02177ddd5f13d
SHA5121d34e73d38b628608b9b5353dc08a79c48b83426ca871081ed169984b47c68fbb688f5de0863fda92bedd5db4773a98f7b25cc6959008f68b97998ba794590f4
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_lzma.pydFilesize
76KB
MD559dd53517c9c41d7d8807e6fce03a487
SHA1596ef04c924030ab98958e466871c91ae97ff321
SHA25675161e65cf2b1cb375ae20e998be956f4c2f9ee0ce8db9521b1b0822d83f3a38
SHA512650be66e69f1444dbe27c80e544f0a6278763153e6aea98f2792b61fe153e2d08c1eabe68fce802d9743b5dea2c53dc74cf3054704ea51ce2c691ef6231f801a
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_multiprocessing.pydFilesize
20KB
MD5e3f5fedb0d9b3477733bd550d786bd1f
SHA10e19e85365ea70d8c4fdb034b1e01c3d8426021a
SHA25676463c6d1c623d7a025869a95072e35090652f8c0ca12b8eef7eb2112d36ee6c
SHA5129f7fcf14c8754f2676dc69a5b95a6ae78b7f2c00dc7232ab33f255c0202771a52db5fd033c2102aba96b2480256e0a160aea99c6a028ac9ac6485e5c59b84ac8
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_overlapped.pydFilesize
23KB
MD5d9bcd3f24495a5373d1fc683cddbd767
SHA1db3e44292502d13d73b2b1d067058c5f719800ac
SHA256298ef595cdef2b1bd408c49cb180b66e70ec4a77647218b5ab8f6fd502493862
SHA512d0eca910a80ab0824ad7fb4920522e830da5495d99e417c56a3dc5041d5669d9db149d60d32960c93dc71590f89afe6bae1b438164ca3ecbc87f5ce4a0419c36
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_queue.pydFilesize
20KB
MD5a6a224be31301d99165fb1be3563c0e2
SHA10e8314ee7153ff684e2c3dd52a60efec8ece3f46
SHA256c455742b742dcbf3f0d5b19dc6c3feaa665d89cdf77fa3d88d75cfa8e3e408ab
SHA512fb35c403638636f081432c1d8a4edd630c0d527f23f45513f4eff8b13ea6a70822f532d3daeab02e085f997c6796c195ed9fbe2bee7703603ab168b62919cbfa
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_socket.pydFilesize
34KB
MD51c1f6d42de40c9a55cb6d0774cf348a5
SHA11b936b0fe510f46eff6b7d2eb0489eeaf957d2fd
SHA256d7ea26ad1d242c00846bc82b4c1c8820b5dc8c63d07f97358b01b917949376e1
SHA512fab5063c9afd35818cea65677d402b136c0841a52e05d8e18de7dcbe0fe4a32ec320568a26401fe0b6e0df2fcec7e90ed57fd56d91c078a67c2c275d4d33cd3a
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_sqlite3.pydFilesize
34KB
MD528f5dbff537b1d8a1e0d7316753b9110
SHA10bad80f466b8104192a18d65844e90dc4f835ac8
SHA2568edbb9f5484e2c149b6a7e32700cb611ac0420e1ec895607bbdd0b32620f8f80
SHA5129a775161a151c500e5c6c499875944fa169d5a811f79362c2fcaec0bcb1a438a8f982db3353359ec35d40b86c0bc9b4ba636546f7aa36204cda98a57179cf818
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\_ssl.pydFilesize
46KB
MD54e9de64a8d77e78de4622fb916dfee25
SHA1fe94023debd8d775de640ff368dc9fbf51acceec
SHA256419de64b2c08c8d905b9912f391ac3a449adaf0abadf942dbc40aced07bbb73f
SHA512d18d985467438c6939b5576b1a369e1e8189e54731bb88408513f7d793e04e17176ca607e6f8496b4b23f2758c8c279d0abf91d4e04158dcda486649b176b175
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\base_library.zipFilesize
821KB
MD53e7a5a119b815c3d88da0f44287e7d9b
SHA14500998273be44ff898390803d4d9967db9ecb01
SHA256f67e8b14c238da24c5d27768eeecbfb37918c63cf348b89a4201b7ee09806007
SHA512a688936d3683590d4714ad5bb1e5c2dfa5e02cf227ddfadbce84dbcfc91eaa0a0d85a0913d288f50d9c3162a7721fb1bf9503a76f5651d4742ba4726425386c2
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\crypto_clipper.jsonFilesize
155B
MD58bff94a9573315a9d1820d9bb710d97f
SHA1e69a43d343794524b771d0a07fd4cb263e5464d5
SHA2563f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7
SHA512d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\libcrypto-1_1.dllFilesize
734KB
MD501c45d86b0828f3c391f25ea76edc47c
SHA14d8f1925b1fcee693ca7804995c13867fa2a5238
SHA256e0ec45ab69b4c16f11d6650f5d67e7766293ed32355f8c5ea68699ace726090e
SHA512841d6fc4229479586e778802a71df2013f60a0c9ce824ef23fbf1abfeebd193cf275cfa4a17e23697138945d108f15980f94c45b88323209576cda66f2852851
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\libffi-7.dllFilesize
22KB
MD54cefa38c700cfba50badfc4af212baa3
SHA1ac150dec57a4d33dea58684d1549b029a16ce01a
SHA25661a641458d1f27a72d12a9734396980086d3622e238750cbf5d08b393f3fbdd7
SHA512540ad8e7bb3c5562b1978d3e40e1181319e2bd5cd3616e9b2b3796a19200a9c6a7813cdf39fbf23ea7d3f43febc824efd49bf3f569ff8dcff97ea27b7272e4f1
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\libopus-0.x64.dllFilesize
217KB
MD5e56f1b8c782d39fd19b5c9ade735b51b
SHA13d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\libssl-1_1.dllFilesize
165KB
MD598e7389323bcaed1456aa06d43daaafc
SHA15fc4ccb7b84d9c42ee11713cf5f805a9876be23f
SHA256073634dbea82ed20283d0bce9e37163028da226815e5cf1ce34fde8c57399d8b
SHA5123460b22087a8d43478c6c91e1287c4129e26f6feb1d9984a2e02ddb72a8a7c77a3e502b64accda23f4ee8545850489c7dbd8fb3fca879b74dc083d3308132abe
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\pyexpat.pydFilesize
65KB
MD55f36a0509aa458d12ebfd852f6f1d312
SHA155e2eb493cf7f28ceaf895f3b25d9184fc90bd63
SHA256795643e6ba953bb7c7ebf6540b1d5e8fd55995e58cce30bf8d806a072a6e8150
SHA51277ad0e7e920d9361c335036348e4896f9f9a44286011081095503dd330568019a16e4f1fbde0c91465b1c74a0aa6863751188bb4086cb9b76bcb435fb96bc97b
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\python38.dllFilesize
1.1MB
MD5b5f6019ec835f3ef2c46bc2761331aa1
SHA11a19795c3069e362f3e987ef618765316764ed01
SHA256b058235a352d58dffd23756cab72586ac945bc6f40c698aeb24e994a503e12b5
SHA5126f7a1c329c4473de1d334a77fffe4bfe7302b483433148ecef1ee6196e3c858f4ed3cca92807eb5dc99ab18b0bd56ea85872c88e69d536acccb8610b9b3497fb
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\select.pydFilesize
19KB
MD5a8b07c93dddefc3468147f31a526a0c4
SHA161ee6738fb99af25e334b6b0aadf7fc8f85ca607
SHA2564cd57812d0b93f1115c6bb887dc871eea92d5efadf8a770b9baafdfd36fa931b
SHA5127968f23d1d3dcad7df83b7dd8e87fa4359b46104bba8bae4113b000bdb003295b2cc0774e7732c51fdf0f77f68987fa6ecd981ba60b22a68ff39eef99d4f8326
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\sqlite3.dllFilesize
428KB
MD571ff5f0482c73e336f7e63a030779626
SHA1bb80d3b9f0f21ff8db0ab1da6589c4f3117f588a
SHA256adbee316221ef40cc95a92037a28b4638874997f96d8bee6d7d9d0ec2b0948aa
SHA512f57b1ce200812682dcdb060ba699d5f64165da1ce2b08d8d53bb768435d731a35b4097b813a0c098421b3a72a36fd0a1989fbbce951658f33b757d6e80808361
-
C:\Users\Admin\AppData\Local\Temp\_MEI42282\unicodedata.pydFilesize
277KB
MD53a7a9036b00a28e4f6e6ff65e7214b08
SHA1ba95ff187ba832569aca9a358a5be3b38af23ba8
SHA256ae0003233439408bd8b1e61e9dab079df56a45fdc0869a2868a415c0495fe7bb
SHA5129fa1414e42ddc23a7a94f8595461e022ee6ec170c1ecca876ef83bcb3a6be1b2a4d1546e0ea895ed6829bf63231d7eddbd7581de9b55307e8535a64ca750e42e
-
memory/1812-34-0x0000000075230000-0x000000007562C000-memory.dmpFilesize
4.0MB
-
memory/1812-60-0x0000000075160000-0x000000007516C000-memory.dmpFilesize
48KB
-
memory/1812-39-0x0000000075170000-0x0000000075192000-memory.dmpFilesize
136KB
-
memory/1812-64-0x0000000074EF0000-0x0000000075142000-memory.dmpFilesize
2.3MB
-
memory/1812-63-0x0000000075150000-0x000000007515F000-memory.dmpFilesize
60KB
-
memory/1812-69-0x0000000074EF0000-0x0000000075142000-memory.dmpFilesize
2.3MB
-
memory/1812-68-0x0000000075150000-0x000000007515F000-memory.dmpFilesize
60KB
-
memory/1812-66-0x0000000075170000-0x0000000075192000-memory.dmpFilesize
136KB
-
memory/1812-65-0x0000000075230000-0x000000007562C000-memory.dmpFilesize
4.0MB