Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe
Resource
win7-20240705-en
General
-
Target
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe
-
Size
12.1MB
-
MD5
1fcf24c61557a96233b0614fb4bd9669
-
SHA1
04e1892a1696068b972b8b1147f61302b40531fe
-
SHA256
4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee
-
SHA512
aecfcf5d5863c0d7776bcfb9d4e975dd9a94602498580ed944d91a9fe9d1013fa1fe2086ac82e6802125a4eb1aa545b0fd017d582e332452c513a6b39f9ee555
-
SSDEEP
196608:qjYZnGHQiasv77LLZOmYgGcEw3Xt51Aitzmg/ZI7phCZd:y+sQiasvvLNOmYg3r3d51AyzmkiFAd
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a00000002335a-11.dat acprotect behavioral2/files/0x000900000002335c-18.dat acprotect behavioral2/files/0x0009000000023414-16.dat acprotect behavioral2/files/0x0007000000023418-20.dat acprotect behavioral2/files/0x0008000000023415-14.dat acprotect -
Loads dropped DLL 7 IoCs
pid Process 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
resource yara_rule behavioral2/memory/892-1-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/memory/892-0-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/files/0x000a00000002335a-11.dat upx behavioral2/files/0x000900000002335c-18.dat upx behavioral2/files/0x0009000000023414-16.dat upx behavioral2/files/0x0007000000023418-20.dat upx behavioral2/files/0x0008000000023415-14.dat upx behavioral2/memory/892-32-0x0000000003240000-0x0000000003298000-memory.dmp upx behavioral2/memory/892-31-0x000000006CEC0000-0x000000006CF39000-memory.dmp upx behavioral2/memory/892-30-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral2/memory/892-29-0x0000000073E90000-0x00000000745C4000-memory.dmp upx behavioral2/memory/892-33-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/892-40-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-75-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-77-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-85-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-84-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-81-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-73-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-71-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-69-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-68-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-65-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-63-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-61-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-59-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-57-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-55-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-53-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-51-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-49-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-47-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-46-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-44-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-43-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-42-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-79-0x0000000005880000-0x00000000058BE000-memory.dmp upx behavioral2/memory/892-95-0x0000000073E90000-0x00000000745C4000-memory.dmp upx behavioral2/memory/892-102-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral2/memory/892-104-0x0000000003240000-0x0000000003298000-memory.dmp upx behavioral2/memory/892-96-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/892-103-0x000000006CEC0000-0x000000006CF39000-memory.dmp upx behavioral2/memory/892-100-0x0000000010000000-0x0000000010018000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3904 892 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeDebugPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeLockMemoryPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeCreateGlobalPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeBackupPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeRestorePrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeShutdownPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeCreateTokenPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe Token: SeTakeOwnershipPrivilege 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe 892 4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe"C:\Users\Admin\AppData\Local\Temp\4a92ce540ff9cc5f2d2cc8723cc6cbb2c41bd283458f19afac82235a4d6bcdee.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 12842⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 892 -ip 8921⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5ad025d607c79bfe1635136b2e879886a
SHA1136bed91251f38ab9607028b13b929b2b6eb9306
SHA25658f92e5df2db5cd4be6bff3b5a2bab139927a475d864974ab84a120685b31c50
SHA51208221ceafa411305d03405db0eb9cd76c477629124b25182daa20b36975fe6a14e49db5bb604b93ced717c75d1a0f070a997869f97b3b08932278cac98209fc7
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
254KB
MD56b82dbdf29f34ab683c7525ea316f6fd
SHA1f7232170d14ac3a6544540f7070b824ef6cd354e
SHA256711552fc86675a863463fed2f75051c1d90f447e0d59e131b08b48e288c3ec09
SHA512d21a112ad3d757e96fb49491cc11c09f9ea472ebc5af9e3b0561fec363acb1995eb2d040f6d6bf940bb6fd601b15f271332f8d719583458432f67ed264c406d9
-
Filesize
5.1MB
MD5b159bba22ed8faee5160ea3e22915dfe
SHA15bc9f90499946050cb560e1d8269ec8ac39dc46c
SHA2563f1eac898b79aed797b8648c6cbf3371ea5525db64fb830bf1fc4da1454eed92
SHA512cef9452f84fe1e30b478e3dfd50fc936ed1aae58e245770b7d3a31dc5ac6f52d54c1c55d61307b64f52efb798da8dcd5246de3cf31281035f72e64a19321f731
-
Filesize
129KB
MD55814d46195be3983e963e13a91657e7a
SHA1ebbfe9956111522918ce7b9f6bd80a3cb79bc330
SHA2568de1e1aeec7490e7ff4a7f8f7617ed6b166e55f694d79aced37c7634b6da4cd9
SHA51299d9c14fefd32d7a665adc2824bf600e43b6a572f27dc88ffb487bb3ac049309cf2b04279f2b3a63290f567a47e99bf6f25db0bda96c1ec80241ceb3fa22cb1d
-
Filesize
164KB
MD5fb8b5a6a1ab9559a8cd27b6553c31218
SHA12e7c95da983a2b0e85a4502b11093c22c4c0cb92
SHA256289bf8cc3f337a49144c0d42dc57455db8117419cab1beaaa82b12c98c063ccf
SHA512a9e5257543d68e2d910cade71cbe128d1026339313e1be52e133fa34c8f984dccaa0c48cdcaff796402202ecdce9bc20af2bcb1f35a433b2181e73566199273c