Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20240508-en
General
-
Target
Install.exe
-
Size
1.5MB
-
MD5
29da5fe413aa82261275a47507505996
-
SHA1
d1d70970a5c7c2b0cc1c053b34313b5c5195aa16
-
SHA256
657271cda48fd7d3c435d71d8139c92b2779728d6352b388fb055e746106228a
-
SHA512
b06784ec703eae235b39724481182ed3cd7ca255d139bc42b48acf1d6306108249e554e4848bb5798a43610222229024096ba52f6236daa0f0405622d7a83ff8
-
SSDEEP
24576:TBWJITU4aiHL265QtUepQLbBFLyTivrEF/WXX73PY5IJnQO3EdomJUtaghkxn:UuhaiB5Qt7QLybF/WXL3PYORQO0d9JUe
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00090000000141c5-14.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1124 Install.tmp -
Loads dropped DLL 2 IoCs
pid Process 2796 Install.exe 1124 Install.tmp -
resource yara_rule behavioral1/files/0x00090000000141c5-14.dat upx behavioral1/memory/1124-27-0x0000000003C10000-0x0000000003F4A000-memory.dmp upx behavioral1/memory/1124-84-0x0000000003C10000-0x0000000003F4A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1124 Install.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1124 Install.tmp 1124 Install.tmp 1124 Install.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28 PID 2796 wrote to memory of 1124 2796 Install.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\is-CKFFK.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-CKFFK.tmp\Install.tmp" /SL5="$4010A,1066541,132608,C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5022360181305907af4f5c51aca0fe04b
SHA12f27bd946c3c8b9563bbd4394d5c9c2378275067
SHA25643ce8ea37e4e13bac4879c7e7fba793e4b66a062f094cb031378e75da38ca866
SHA512f23531bafaccc4f60e770113582676446bc8553d110b9bcfa980dfd41efc70c9a5882a194ef4aeca86714af8cdeb6ec3cf51a4325831bda0a896db73559cd3f1
-
Filesize
866KB
MD502c1da5bef779903151ab958ef3be92c
SHA19233f55588eae8f3a73e06e2f5549b92a07590ae
SHA256d82406839714541c9ef3f7660a21c3dd5927b13f09c6a8260708b4e04dc0bc66
SHA512e511bbaf3eed4778f8ae89401a8a60454a2d19f6f08418953c8885f88d71556ce0e45601d6aac696ae9f669fd66aa92bf40bdd97139c65d7e8ae5c4ea438f0c8