Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe
Resource
win7-20240705-en
General
-
Target
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe
-
Size
12.1MB
-
MD5
1fcf24c61557a96233b0614fb4bd9669
-
SHA1
04e1892a1696068b972b8b1147f61302b40531fe
-
SHA256
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee
-
SHA512
aecfcf5d5863c0d7776bcfb9d4e975dd9a94602498580ed944d91a9fe9d1013fa1fe2086ac82e6802125a4eb1aa545b0fd017d582e332452c513a6b39f9ee555
-
SSDEEP
196608:qjYZnGHQiasv77LLZOmYgGcEw3Xt51Aitzmg/ZI7phCZd:y+sQiasvvLNOmYg3r3d51AyzmkiFAd
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0030000000016108-10.dat acprotect behavioral1/files/0x00080000000166c7-13.dat acprotect behavioral1/files/0x00080000000164cf-16.dat acprotect behavioral1/files/0x00080000000163b9-18.dat acprotect behavioral1/files/0x0007000000016c03-20.dat acprotect -
Loads dropped DLL 6 IoCs
pid Process 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
resource yara_rule behavioral1/memory/2752-0-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/2752-1-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/files/0x0030000000016108-10.dat upx behavioral1/files/0x00080000000166c7-13.dat upx behavioral1/memory/2752-15-0x00000000740E0000-0x0000000074814000-memory.dmp upx behavioral1/files/0x00080000000164cf-16.dat upx behavioral1/files/0x00080000000163b9-18.dat upx behavioral1/files/0x0007000000016c03-20.dat upx behavioral1/memory/2752-22-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral1/memory/2752-25-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral1/memory/2752-24-0x0000000001060000-0x00000000010B8000-memory.dmp upx behavioral1/memory/2752-23-0x000000006CEC0000-0x000000006CF39000-memory.dmp upx behavioral1/memory/2752-76-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-74-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-72-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-70-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-68-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-66-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-64-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-62-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-60-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-58-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-56-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-54-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-52-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-50-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-48-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-46-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-44-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-42-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-40-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-38-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-36-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-35-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-34-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-33-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-31-0x0000000004250000-0x000000000428E000-memory.dmp upx behavioral1/memory/2752-99-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/2752-98-0x0000000001060000-0x00000000010B8000-memory.dmp upx behavioral1/memory/2752-96-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral1/memory/2752-94-0x00000000740E0000-0x0000000074814000-memory.dmp upx behavioral1/memory/2752-95-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2548 2752 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeDebugPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeCreateGlobalPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeBackupPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeRestorePrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeShutdownPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeCreateTokenPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeTakeOwnershipPrivilege 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2548 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 30 PID 2752 wrote to memory of 2548 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 30 PID 2752 wrote to memory of 2548 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 30 PID 2752 wrote to memory of 2548 2752 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe"C:\Users\Admin\AppData\Local\Temp\4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 7082⤵
- Program crash
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5ad025d607c79bfe1635136b2e879886a
SHA1136bed91251f38ab9607028b13b929b2b6eb9306
SHA25658f92e5df2db5cd4be6bff3b5a2bab139927a475d864974ab84a120685b31c50
SHA51208221ceafa411305d03405db0eb9cd76c477629124b25182daa20b36975fe6a14e49db5bb604b93ced717c75d1a0f070a997869f97b3b08932278cac98209fc7
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
254KB
MD56b82dbdf29f34ab683c7525ea316f6fd
SHA1f7232170d14ac3a6544540f7070b824ef6cd354e
SHA256711552fc86675a863463fed2f75051c1d90f447e0d59e131b08b48e288c3ec09
SHA512d21a112ad3d757e96fb49491cc11c09f9ea472ebc5af9e3b0561fec363acb1995eb2d040f6d6bf940bb6fd601b15f271332f8d719583458432f67ed264c406d9
-
Filesize
5.1MB
MD5b159bba22ed8faee5160ea3e22915dfe
SHA15bc9f90499946050cb560e1d8269ec8ac39dc46c
SHA2563f1eac898b79aed797b8648c6cbf3371ea5525db64fb830bf1fc4da1454eed92
SHA512cef9452f84fe1e30b478e3dfd50fc936ed1aae58e245770b7d3a31dc5ac6f52d54c1c55d61307b64f52efb798da8dcd5246de3cf31281035f72e64a19321f731
-
Filesize
129KB
MD55814d46195be3983e963e13a91657e7a
SHA1ebbfe9956111522918ce7b9f6bd80a3cb79bc330
SHA2568de1e1aeec7490e7ff4a7f8f7617ed6b166e55f694d79aced37c7634b6da4cd9
SHA51299d9c14fefd32d7a665adc2824bf600e43b6a572f27dc88ffb487bb3ac049309cf2b04279f2b3a63290f567a47e99bf6f25db0bda96c1ec80241ceb3fa22cb1d
-
Filesize
164KB
MD5fb8b5a6a1ab9559a8cd27b6553c31218
SHA12e7c95da983a2b0e85a4502b11093c22c4c0cb92
SHA256289bf8cc3f337a49144c0d42dc57455db8117419cab1beaaa82b12c98c063ccf
SHA512a9e5257543d68e2d910cade71cbe128d1026339313e1be52e133fa34c8f984dccaa0c48cdcaff796402202ecdce9bc20af2bcb1f35a433b2181e73566199273c