Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 04:27

General

  • Target

    beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe

  • Size

    268KB

  • MD5

    fe0f4ec241ed6f7a9eeec567ebbbe3f2

  • SHA1

    ce34ba7ac037f1376ca4223046e8d87af4b81df3

  • SHA256

    beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2

  • SHA512

    498991cbc2053d8ee8a6c61812f0d8919c80782390e439ff4f184d4003aa046a499636a1df9d00c20f48034765f2cf7294520bd287c5179ecfbcfacb57746339

  • SSDEEP

    6144:8VfjmNt1RAuOqXHNe/r3MVutniQ26fkdXJ:+7+tAWXA/rOciQ26f6

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3408
      • C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe
        "C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4172
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a63EA.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe
            "C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1152
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3876
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4040
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

      Filesize

      244KB

      MD5

      a06aae22e04cb762b3fa2b8720a60c5a

      SHA1

      5daecf97ba7ef1fb4cc135f78345c811a497af05

      SHA256

      593ef1d9373c0b200332cc0dbabd2e66aa0e8b9b4d4131bf313693cb51add866

      SHA512

      4ca67c0179799a064dcefe3cfe89c57d45221b9c447b5c4d1c78c370960e5d8e3d8583575d2f6e76e09bd788bcf571f8afac5361582c27b749bfe77569b178b2

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      570KB

      MD5

      331b63bacc78e00201f480451a0711ee

      SHA1

      17096ae337a333978528766808e9aec629d34600

      SHA256

      d5e326eabdc8a4d8c0130dc7a9b367ba43792084785684329ecdf9bc25357495

      SHA512

      df0aa2098c3fe8664bf3223f326d187a7f4479ff3b01eb28aec00b298ae9e2b43178d754c0e3bb960c3be3cf546c35489c06063d997e86cb9c74160776b483b0

    • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

      Filesize

      636KB

      MD5

      2500f702e2b9632127c14e4eaae5d424

      SHA1

      8726fef12958265214eeb58001c995629834b13a

      SHA256

      82e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c

      SHA512

      f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c

    • C:\Users\Admin\AppData\Local\Temp\$$a63EA.bat

      Filesize

      722B

      MD5

      1411f7704d1f88cf632580c09421f02a

      SHA1

      43473b9f9de410646b05ed569904883e7c776ccf

      SHA256

      e7df73ded5874f6e877ed425a26d2b74e5cd17469fd2d25c069d6a5bcca7aaa1

      SHA512

      ae382e24a4309da1f0b9fccac5d19b5fb4df09879401a2001b1f3f781121d85937f15b2314b5bf87525aa08f4d1be7bfecb22d76e5cfbbcf1eba31f668388d56

    • C:\Users\Admin\AppData\Local\Temp\beceaf28c131a5d48bfebaae513f3ee27da1a4f36a2cb892af6298487a2b90a2.exe.exe

      Filesize

      241KB

      MD5

      34fc461f27a58b897e38adcb5dd25f49

      SHA1

      952d24b184c7440fdae44c868b25b0c13afc4a71

      SHA256

      01488ede48d1cc463b768563c91e2043e1622a3edb2e99ef1e9c217a299602fa

      SHA512

      d1ae4a3e923637ba97b11ddc3d39f2b93eabfa284d64bae7858b706379c7af7523b7c34aed9af9e858d12e7b039d44b69234666ec337cfb844b6a9a34bc21a60

    • C:\Users\Admin\AppData\Local\Temp\dki6522.tmp

      Filesize

      172KB

      MD5

      4f407b29d53e9eb54e22d096fce82aa7

      SHA1

      a4ee25b066cac19ff679dd491f5791652bb71185

      SHA256

      cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc

      SHA512

      325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183

    • C:\Windows\Logo1_.exe

      Filesize

      26KB

      MD5

      dfeb8bc493ae29fdfd9463961f22ffa1

      SHA1

      1665dc95dfb3977f5883eb18832cce97fdc82562

      SHA256

      01e5d82665723f3fd606ec28df1235712effad7ff0c509f08cb88fdf4c322359

      SHA512

      36cbe8b3820898910ebc32b67653311326ed7a2a828760d22219262328a835e8167a8ce2bafb853f9cff235668b28794845d32764240efb90cdd72f20a553cab

    • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\_desktop.ini

      Filesize

      9B

      MD5

      1d7eff79e14bea77e992f25202a6decc

      SHA1

      2481953494e9f17a5d9c8186bac1e89c460da06b

      SHA256

      0bc3f26881fb44793cd3a989e616ce2b45848152d57eb4a38fd5f06df63f0a9a

      SHA512

      e9cffe2ce1cc689a1a0c9bee4da9e0ab90625931729257893780b13eb9060ee26bf373c87c0ae33e3fcdc3e8614d415ac00fe57fd7f1fb4908212cc145c8d9ad

    • memory/1152-19-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1152-24-0x0000000002260000-0x00000000022D4000-memory.dmp

      Filesize

      464KB

    • memory/1152-32-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1152-31-0x0000000002260000-0x00000000022D4000-memory.dmp

      Filesize

      464KB

    • memory/3876-33-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-41-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-49-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-55-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-30-0x0000000002EE0000-0x0000000002F54000-memory.dmp

      Filesize

      464KB

    • memory/3876-1253-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-4815-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-5262-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3876-5265-0x0000000002EE0000-0x0000000002F54000-memory.dmp

      Filesize

      464KB

    • memory/4172-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4172-10-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB