Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe
Resource
win10v2004-20240611-en
General
-
Target
1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe
-
Size
4.2MB
-
MD5
a6dfc1c9ade8bb9f696a9168470a7770
-
SHA1
8398d002b407334b9dc27431bb006ef19b9e36b2
-
SHA256
1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66
-
SHA512
10aded9362791d914744da495675d6d1aea7ee6625772e3e7e6801a6f22914dc7ebb0433cf139e83f925856477e80f1d994c6e2c323a4a5e1d4589ff79121f3b
-
SSDEEP
49152:QGUwKu/5dlHb0xn91Q2C5AVlY7SJb/UoaHwq5CPK3MXRQz70Vgaej5f7U5fWwCHo:QGUBu/5dN+91QNAw7M7dxsOg73I
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000d000000023457-5.dat acprotect behavioral2/files/0x000b000000023458-13.dat acprotect behavioral2/files/0x000a000000023455-19.dat acprotect -
Loads dropped DLL 6 IoCs
pid Process 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe -
resource yara_rule behavioral2/files/0x000d000000023457-5.dat upx behavioral2/memory/2604-16-0x0000000004C80000-0x0000000004D45000-memory.dmp upx behavioral2/files/0x000b000000023458-13.dat upx behavioral2/memory/2604-24-0x0000000004180000-0x0000000004193000-memory.dmp upx behavioral2/memory/2604-23-0x0000000002E10000-0x0000000002E94000-memory.dmp upx behavioral2/memory/2604-22-0x0000000004C80000-0x0000000004D45000-memory.dmp upx behavioral2/files/0x000a000000023455-19.dat upx behavioral2/memory/2604-30-0x0000000002E10000-0x0000000002E94000-memory.dmp upx behavioral2/memory/2604-29-0x0000000004C80000-0x0000000004D45000-memory.dmp upx behavioral2/memory/2604-81-0x0000000004180000-0x0000000004193000-memory.dmp upx behavioral2/memory/2604-80-0x0000000002E10000-0x0000000002E94000-memory.dmp upx behavioral2/memory/2604-79-0x0000000004C80000-0x0000000004D45000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe Token: SeIncBasePriorityPrivilege 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2604 1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe"C:\Users\Admin\AppData\Local\Temp\1b807893801a0ba0e6c2c0c2bfba59dc5779a1471cd00c57a27aa82afe2acd66.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2604
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD58b0e2b2c71d69bca02960e9d38b76b29
SHA1a85fbd6e058b61a35e9a8ad666d91d77710adbda
SHA25635c3afbe966c77ec0122cdfa960c21bf9f015365c7c74744d9059fa89d1ed240
SHA5125f517149829617c5c3be8b0b03227f01fdc5de3b2b645d4fcb76c7179d5827bd50266c899efe3bb79529aee0731dd479a35e37c7ef8759df22e2081316cc35df
-
Filesize
174KB
MD52f703c0a8f18f8678e330428a4a40be5
SHA19a34fc3449277fa11e836a47dffbde214cccef07
SHA25655671a1f118d606a0a8ed31cb6806916c6b09ad7d85ef269055e69b96fc94deb
SHA51274f6be377b8a0bd69701503e939c572f23bffd9320a96c9ad14c9ce84d4e350d3215e1e8531c3322da71dbb10123bcc3c450b09b76b356f857f7008a6fce7fbd
-
Filesize
23KB
MD5be8b666b5c0aa1325fe50c4332de3b0a
SHA1f9ca7898c6ed4f186f49becf2aad0ee6c3a9eb3d
SHA25641b66f64b12047c5aecfadcfa70bfa6fcbd7d8bca7fa5b9d4a3f8463f84064bc
SHA512be8019cd74a87742735c819eadf82f2e277d8d284c205d396db21c90c5749f6213432f4e6f16eb93533b01313257aee6de301a1fee304c97ee1646046a7220f0