Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe
Resource
win7-20240611-en
General
-
Target
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe
-
Size
9.6MB
-
MD5
acbf4b85e79cebd64f71f96ab4e08edd
-
SHA1
41b7dfb70131b9fa7826345950624afd98bd9dd9
-
SHA256
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6
-
SHA512
137c1c44df642a686296b67a738e9242094c9c0fe6203b426d652522e7bd16dc24361d2cb8f55b484d5858303a5cf8ac1f471c83022c13e625c576dd9f27025b
-
SSDEEP
196608:9vdZfuYbS/XV5o/7xM7LRRm/zuKLvvxdF6TKKDas+rYn+KMTKbi:t3fcXV5ozaRSZLv5tZrsq2
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1176-43-0x0000000000400000-0x00000000018E0000-memory.dmp detect_ak_stuff behavioral1/memory/1176-49-0x0000000000400000-0x00000000018E0000-memory.dmp detect_ak_stuff behavioral1/memory/1176-50-0x0000000000400000-0x00000000018E0000-memory.dmp detect_ak_stuff behavioral1/memory/1176-52-0x0000000000400000-0x00000000018E0000-memory.dmp detect_ak_stuff behavioral1/memory/1176-61-0x0000000000400000-0x00000000018E0000-memory.dmp detect_ak_stuff -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\libcurl.dll acprotect -
Loads dropped DLL 2 IoCs
Processes:
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exepid process 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe -
Processes:
resource yara_rule behavioral1/memory/1176-44-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral1/memory/1176-51-0x0000000001C20000-0x0000000001C2B000-memory.dmp upx \Users\Admin\AppData\Local\Temp\libcurl.dll upx behavioral1/memory/1176-56-0x0000000073F60000-0x00000000741FB000-memory.dmp upx behavioral1/memory/1176-59-0x0000000073F60000-0x00000000741FB000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exepid process 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exepid process 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exepid process 1176 59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe"C:\Users\Admin\AppData\Local\Temp\59c882714ebbe3113113ea323aae6fc0460d0af2af046972a6383597c0e4aef6.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\libcurl.dllFilesize
1.2MB
MD5cc73654317d0e52553f1f9e1bdbbc2f0
SHA18fe1fc72da9599a59392ea784fc89101a8057468
SHA2563baf364955a64581f8984c9c76ca68a9a104f6747ee00fd2d2033a29edc84cbb
SHA51235fa5c4ff9386c71403f74a4f6517bf6b31da264f56472ff58666e4617b75a86f0cd523e9460c3bafca7b04c6345d887982bec2b630ad214b79227a209f941d5
-
\Users\Admin\AppData\Local\Temp\libmySQL.dllFilesize
4.4MB
MD53f28377bfd63d619fda60a7603815045
SHA1371a0d14786d58e0fa0da6828dbba74f8ae3fe01
SHA256ac370863f8028f5ea32f51441f20f3c5b6f67ec338c7ff2ed4709e3939dad3fb
SHA512f2a24659871013173645f475a6e650cfc6c48a06af9fdefd5b5733996b6eba31f2151957b3f193183b3a07b811a61ed2ea6bc8f55cba40e0ed05013a56d24dd0
-
memory/1176-50-0x0000000000400000-0x00000000018E0000-memory.dmpFilesize
20.9MB
-
memory/1176-61-0x0000000000400000-0x00000000018E0000-memory.dmpFilesize
20.9MB
-
memory/1176-0-0x0000000000AFB000-0x0000000000F54000-memory.dmpFilesize
4.3MB
-
memory/1176-44-0x0000000010000000-0x000000001001E000-memory.dmpFilesize
120KB
-
memory/1176-38-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/1176-35-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/1176-33-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/1176-30-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1176-28-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1176-25-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1176-23-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1176-20-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1176-18-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1176-16-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1176-40-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/1176-13-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/1176-49-0x0000000000400000-0x00000000018E0000-memory.dmpFilesize
20.9MB
-
memory/1176-11-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/1176-10-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1176-8-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1176-6-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1176-5-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1176-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1176-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1176-51-0x0000000001C20000-0x0000000001C2B000-memory.dmpFilesize
44KB
-
memory/1176-52-0x0000000000400000-0x00000000018E0000-memory.dmpFilesize
20.9MB
-
memory/1176-43-0x0000000000400000-0x00000000018E0000-memory.dmpFilesize
20.9MB
-
memory/1176-56-0x0000000073F60000-0x00000000741FB000-memory.dmpFilesize
2.6MB
-
memory/1176-59-0x0000000073F60000-0x00000000741FB000-memory.dmpFilesize
2.6MB
-
memory/1176-60-0x0000000000AFB000-0x0000000000F54000-memory.dmpFilesize
4.3MB
-
memory/1176-15-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB