Overview
overview
7Static
static
7a667ab13fd...0N.exe
windows7-x64
7a667ab13fd...0N.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
1$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
7$TEMP/$_90...nd.dll
windows7-x64
3$TEMP/$_90...nd.dll
windows10-2004-x64
3$TEMP/$_90...in.dll
windows7-x64
1$TEMP/$_90...in.dll
windows10-2004-x64
1Analysis
-
max time kernel
24s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 10:16
Behavioral task
behavioral1
Sample
a667ab13fd3e45b3327d3be86b132260N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a667ab13fd3e45b3327d3be86b132260N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$TEMP/$_90_/MyNsisExtend.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$TEMP/$_90_/MyNsisExtend.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$TEMP/$_90_/MyNsisSkin.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$TEMP/$_90_/MyNsisSkin.dll
Resource
win10v2004-20240709-en
General
-
Target
a667ab13fd3e45b3327d3be86b132260N.exe
-
Size
937KB
-
MD5
a667ab13fd3e45b3327d3be86b132260
-
SHA1
ca7a7cd0bf73d1f89d46a84d9815bbe6baeb0f17
-
SHA256
0ab0bfdf37327537edf57751c1b2b07ec498b3c17c6782d2a2b6b535f353cfd3
-
SHA512
40555bbea85463f690fc66437cf1952cd08c00e3404c40f337f0e045c9346b9936ef3017d8e4ee7f5602711de9a3e4edcb143f866f5da89bfba9a4084b9c06c7
-
SSDEEP
24576:ZiRFReuIEPhd3Z4vw5GVq9l1bVZyWQGDF7VemM:UeulzZsw5GA73CG57VtM
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000018f94-19.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2436 Au_.exe -
Loads dropped DLL 9 IoCs
pid Process 1140 a667ab13fd3e45b3327d3be86b132260N.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe 2436 Au_.exe -
resource yara_rule behavioral1/files/0x0006000000018f94-19.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000018f84-2.dat nsis_installer_1 behavioral1/files/0x0007000000018f84-2.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30 PID 1140 wrote to memory of 2436 1140 a667ab13fd3e45b3327d3be86b132260N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a667ab13fd3e45b3327d3be86b132260N.exe"C:\Users\Admin\AppData\Local\Temp\a667ab13fd3e45b3327d3be86b132260N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5a1bc3b1cfbc2bca222149f1c8e035fa9
SHA13b83e21d38de489bd1aa4e875a3c98f58095ac8c
SHA256f3d7906579bafe366da8f1779a34a103412fb1122cc38951ab2173bd3d6289fd
SHA512d8bae9cf73ef484b10b84c386b7b311be5f5a07b2c38808d64fffa695fda7bff35b24797c179030a5a5ad30883ee4212236c40fb1020dbc0f6350f86ab7b4572
-
Filesize
536KB
MD5ae20c78878bffd789a4f900d420a47fd
SHA1166bb9311a99a4bb42dcb9337e704e0248ca8f58
SHA2567690f9653732bf3d8ec0b0a89eaf6763171864d23bb41971e5b9649bbea80b60
SHA512c0a9b177ca962e5fcd308c49e2f71afdb7d9498ef80547b2febece9765df6bb6f0d0623518aff22bf908189f26a8e1fb9aa326e9790501465d9e985f9993595b
-
Filesize
324KB
MD5c42575c6e2e273c04eb7bc3e4119e337
SHA1658e3d042e28196a321ee6446b9e6845d5478abc
SHA2569f8c4e9ae3d8b764f860b19024ce077a26758d79eeed309a475fa152b7a1f736
SHA512b1743d6804685da6c8ea2cea2d91c2f98e2e2ff9eaeccc7d873f1f90eb58f43c50d17b9acb309e71eb94c3b38f5dcc6736d2f0fc2c1a089eae4cca8d4743c308
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
21KB
MD5ab467b8dfaa660a0f0e5b26e28af5735
SHA1596abd2c31eaff3479edf2069db1c155b59ce74d
SHA256db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73
SHA5127d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301
-
Filesize
937KB
MD5a667ab13fd3e45b3327d3be86b132260
SHA1ca7a7cd0bf73d1f89d46a84d9815bbe6baeb0f17
SHA2560ab0bfdf37327537edf57751c1b2b07ec498b3c17c6782d2a2b6b535f353cfd3
SHA51240555bbea85463f690fc66437cf1952cd08c00e3404c40f337f0e045c9346b9936ef3017d8e4ee7f5602711de9a3e4edcb143f866f5da89bfba9a4084b9c06c7