Analysis

  • max time kernel
    107s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 21:04

General

  • Target

    9f6254939bbc68156e9cd5c88b84e57e17d3c0e66d92835704012167056d256e.exe

  • Size

    6.0MB

  • MD5

    cad836fc4dd83f08b3c45caca7a2b070

  • SHA1

    3f73f804db9938c54180b0fed02abd81e32ad943

  • SHA256

    9f6254939bbc68156e9cd5c88b84e57e17d3c0e66d92835704012167056d256e

  • SHA512

    6603c122a635231a4f8b7292251d518af86da5d27cf8f2080621730e3d3d85f0fbecaffc4a1919d3b929b0d4e2ae5c5cec53e2fdabf0273e0884b3fecd5504f4

  • SSDEEP

    98304:DhVOYRYybVGu3szy1szOxluclTIFyP68slL72yHgKJPZQrRTLkMXX/l:DhxRPAu3sznqJdDjslL71gKJZQrVbPl

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f6254939bbc68156e9cd5c88b84e57e17d3c0e66d92835704012167056d256e.exe
    "C:\Users\Admin\AppData\Local\Temp\9f6254939bbc68156e9cd5c88b84e57e17d3c0e66d92835704012167056d256e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\cacls.exe
      cacls "" /e /p everyone:n
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3344

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7-zip32_2.dll

          Filesize

          233KB

          MD5

          ea3df059beae86a3e186b2b179755e77

          SHA1

          babdcd6b5082c02fa2f5ebc2020f2cb3bbd77e8d

          SHA256

          1ab68a0c296281437fe638c8535309c6241ded4852608d940f5efcb8cc2d91a6

          SHA512

          1406d8083cfbd26e18aba74f6b45a09137bb3960f7afce5c5d0d790b0edb7277b7b885ed2ded9def12b667bcb37cbfb335884b2d7b8f08565743b674d1f053bb

        • memory/1116-0-0x0000000010000000-0x0000000010018000-memory.dmp

          Filesize

          96KB

        • memory/1116-3-0x00000000770D9000-0x00000000770DA000-memory.dmp

          Filesize

          4KB

        • memory/1116-2-0x0000000010000000-0x0000000010018000-memory.dmp

          Filesize

          96KB

        • memory/1116-4-0x00000000770C0000-0x00000000771B0000-memory.dmp

          Filesize

          960KB

        • memory/1116-14-0x0000000005E80000-0x0000000005F1F000-memory.dmp

          Filesize

          636KB

        • memory/1116-13-0x0000000005E80000-0x0000000005F1F000-memory.dmp

          Filesize

          636KB

        • memory/1116-42-0x0000000005E80000-0x0000000005F1F000-memory.dmp

          Filesize

          636KB

        • memory/1116-43-0x00000000770C0000-0x00000000771B0000-memory.dmp

          Filesize

          960KB