Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:15
Behavioral task
behavioral1
Sample
2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe
Resource
win7-20240903-en
General
-
Target
2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe
-
Size
237KB
-
MD5
f12f4efa10ffa56f032a5dca01c354d0
-
SHA1
f1de33699675f75f44f4a9883671b6714a72320f
-
SHA256
2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3
-
SHA512
93c2e0b6deeac2a6a197e1b6f576153ae79d40142cd1382db25be8b9a1d2299cc1069f41fdc75e1d0c48aeb7f82b6445e0fa391479bad2cec2be92eabb1a5b83
-
SSDEEP
3072:l1Upt1DlS2KyYzDhLrLeBdVw9+TpFLMHb+lXpQK5:CYzdLQa8z0yQQ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023485-8.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1504 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 1504 svchost.exe 1504 svchost.exe -
resource yara_rule behavioral2/memory/4932-0-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/files/0x0007000000023485-8.dat upx behavioral2/memory/4932-9-0x0000000002340000-0x0000000002360000-memory.dmp upx behavioral2/files/0x0008000000023483-13.dat upx behavioral2/memory/4932-22-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/1504-16-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4932-15-0x0000000002340000-0x0000000002360000-memory.dmp upx behavioral2/memory/1504-23-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\I: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\J: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\N: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\P: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\V: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\H: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\M: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\Q: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\T: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\U: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\S: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\G: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\K: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\L: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\O: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened (read-only) \??\R: 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\IPQ.dll 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe File opened for modification C:\Windows\SysWOW64\IPQ.dll 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1005PV 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32\ = "C:\\Windows\\SysWow64\\IPQ.dll" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\Clsid svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ProgID 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\ = "Maihook1005" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\Clsid 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32\ = "C:\\Windows\\SysWow64\\IPQ.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32\ThreadingModel = "Apartment" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ProgID svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ = "Maihook1005" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32\ThreadingModel = "Apartment" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1005PV svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839} 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ProgID\ = "IPQ.ShellExecuteHook1005" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1005PV\DFile = "051044070052044076098244049039105107066066234067063163246228173191117211202096198215171239134192004194151138037049024091" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\ = "Maihook1005" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QPWorkFile1005PV\EFile = "051035070052045070108245049039110103159066121227002238252159082122237188115006215209129109182138167116058165" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ = "Maihook1005" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\InprocServer32 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D65F220-63CA-11D8-9BDB-FD58F515A839}\ProgID\ = "IPQ.ShellExecuteHook1005" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\Clsid\ = "{4D65F220-63CA-11D8-9BDB-FD58F515A839}" 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPQ.ShellExecuteHook1005\Clsid\ = "{4D65F220-63CA-11D8-9BDB-FD58F515A839}" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1504 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1504 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 82 PID 4932 wrote to memory of 1504 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 82 PID 4932 wrote to memory of 1504 4932 2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe"C:\Users\Admin\AppData\Local\Temp\2dedc6c3c6677be5f937a5ea8e8ab328f1e39f0c9ec5db0329718472a32132e3N.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\PerfLogs\svchost.exeC:\PerfLogs\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD59dbeeda3f485913348eb3a8759758737
SHA1bd4ac67cd9efc91621f509318ab6b82a46cf44f5
SHA256a633bec6d59cbdcdbb36d2e1d1f7ed23c06bd375aef7387bfff18e0a9f1845e6
SHA5127da8074f77491c5d879db89cb420c95b2661910935e1c371ba057a1386ae7b8aba9e1963e999e42f65aadd3aa69c73c0ad638706d597edcb396cc553c134a151
-
Filesize
284KB
MD5c23974b83d6a53bb42e38105892c4ab2
SHA1afb80d4afb6c2cac3de4b0dd52b5e7a7ac9cabe7
SHA2561ab13f40b2191ab62715c0759309a4198fc0a0a47f1d444a226eaf84e8f30912
SHA512dba21d6c0f01115b1a75cd79937155086b08a1e0bf634f3a8c1a3ed2586c0802da05bc8231a6489a146f4c55e63903f33e6803434903d753948baca49d58d68d