Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:47
Behavioral task
behavioral1
Sample
mimic.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mimic.exe
Resource
win10v2004-20240802-en
General
-
Target
mimic.exe
-
Size
7.0MB
-
MD5
cda13c6a7a6b9ca42a6142a9606c469d
-
SHA1
ec3ecd5ad0917376034690f619018492960a1e15
-
SHA256
0492c19f21fae3e2718a78444f2811d6b3524bdecc16a8dcbfe8b0e16df7a38e
-
SHA512
48a0614508b6937d56b7ce70d0cd6b06f7a6e284a0c6c71d056aecef1629e31c2aee612081a02cdde395f3c2dc8930840ba0c8d7ec27c9c1afc4fae6930ddfea
-
SSDEEP
196608:wB3e0E5MGzr3RhdJFk2kKVxpH8PIQJXOS/2JSNYPA:whMmGzFt22fpIZOS/A4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 17 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015d78-55.dat acprotect behavioral1/files/0x00050000000186c8-61.dat acprotect behavioral1/files/0x0005000000019240-66.dat acprotect behavioral1/files/0x00050000000193b7-70.dat acprotect behavioral1/files/0x0005000000019263-71.dat acprotect behavioral1/files/0x0005000000019220-76.dat acprotect behavioral1/files/0x00060000000190c6-80.dat acprotect behavioral1/files/0x000500000001925d-79.dat acprotect behavioral1/files/0x00060000000190c9-83.dat acprotect behavioral1/files/0x000500000001867d-87.dat acprotect behavioral1/files/0x0005000000019238-92.dat acprotect behavioral1/files/0x0005000000019399-94.dat acprotect behavioral1/files/0x000500000001938b-96.dat acprotect behavioral1/files/0x0005000000019278-98.dat acprotect behavioral1/files/0x000d000000018662-106.dat acprotect behavioral1/files/0x0005000000019280-113.dat acprotect behavioral1/memory/960-298-0x0000000003FB0000-0x00000000041A1000-memory.dmp acprotect -
Executes dropped EXE 3 IoCs
pid Process 1600 svchost.exe 960 svchost.exe 1504 winlogon.exe -
Loads dropped DLL 40 IoCs
pid Process 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 2820 mimic.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe 1504 winlogon.exe 1504 winlogon.exe -
resource yara_rule behavioral1/memory/2520-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/files/0x0009000000015d78-55.dat upx behavioral1/memory/2820-57-0x000000001E000000-0x000000001E254000-memory.dmp upx behavioral1/files/0x00050000000186c8-61.dat upx behavioral1/memory/2820-63-0x0000000010000000-0x000000001004F000-memory.dmp upx behavioral1/files/0x0005000000019240-66.dat upx behavioral1/memory/2820-69-0x000000001E8C0000-0x000000001E8E2000-memory.dmp upx behavioral1/files/0x00050000000193b7-70.dat upx behavioral1/files/0x0005000000019263-71.dat upx behavioral1/memory/2820-74-0x0000000000270000-0x00000000002DE000-memory.dmp upx behavioral1/memory/2820-72-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral1/files/0x0005000000019220-76.dat upx behavioral1/memory/2820-81-0x0000000000360000-0x0000000000370000-memory.dmp upx behavioral1/files/0x00060000000190c6-80.dat upx behavioral1/files/0x000500000001925d-79.dat upx behavioral1/memory/2820-78-0x000000001E800000-0x000000001E84D000-memory.dmp upx behavioral1/files/0x00060000000190c9-83.dat upx behavioral1/memory/2820-88-0x000000001D1A0000-0x000000001D1B9000-memory.dmp upx behavioral1/memory/2820-85-0x0000000000450000-0x000000000050E000-memory.dmp upx behavioral1/memory/2520-84-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/files/0x000500000001867d-87.dat upx behavioral1/memory/2820-90-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2820-91-0x000000001EA10000-0x000000001EA35000-memory.dmp upx behavioral1/files/0x0005000000019238-92.dat upx behavioral1/files/0x0005000000019399-94.dat upx behavioral1/files/0x000500000001938b-96.dat upx behavioral1/files/0x0005000000019278-98.dat upx behavioral1/memory/2820-104-0x0000000000390000-0x00000000003A0000-memory.dmp upx behavioral1/memory/2820-103-0x0000000069DC0000-0x0000000069DD0000-memory.dmp upx behavioral1/memory/2820-102-0x00000000003A0000-0x00000000003B2000-memory.dmp upx behavioral1/memory/2820-101-0x0000000000380000-0x000000000038B000-memory.dmp upx behavioral1/memory/2820-100-0x000000001E000000-0x000000001E254000-memory.dmp upx behavioral1/files/0x000d000000018662-106.dat upx behavioral1/memory/2820-108-0x000000001E8C0000-0x000000001E8E2000-memory.dmp upx behavioral1/memory/2820-107-0x000000001EA40000-0x000000001EA71000-memory.dmp upx behavioral1/files/0x0005000000019280-113.dat upx behavioral1/memory/2820-115-0x00000000003E0000-0x00000000003F0000-memory.dmp upx behavioral1/memory/2820-116-0x0000000000270000-0x00000000002DE000-memory.dmp upx behavioral1/files/0x0005000000019db8-121.dat upx behavioral1/memory/1600-168-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2820-166-0x00000000003E0000-0x00000000003F0000-memory.dmp upx behavioral1/memory/2820-165-0x0000000010000000-0x000000001004F000-memory.dmp upx behavioral1/memory/2820-164-0x000000001E000000-0x000000001E254000-memory.dmp upx behavioral1/memory/2820-160-0x0000000069DC0000-0x0000000069DD0000-memory.dmp upx behavioral1/memory/2820-159-0x00000000003A0000-0x00000000003B2000-memory.dmp upx behavioral1/memory/2820-158-0x0000000000380000-0x000000000038B000-memory.dmp upx behavioral1/memory/2820-157-0x000000001EA10000-0x000000001EA35000-memory.dmp upx behavioral1/memory/2820-156-0x000000001D1A0000-0x000000001D1B9000-memory.dmp upx behavioral1/memory/2820-155-0x0000000000450000-0x000000000050E000-memory.dmp upx behavioral1/memory/2820-153-0x0000000000360000-0x0000000000370000-memory.dmp upx behavioral1/memory/2820-152-0x000000001E800000-0x000000001E84D000-memory.dmp upx behavioral1/memory/2820-150-0x0000000000270000-0x00000000002DE000-memory.dmp upx behavioral1/memory/2820-149-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral1/memory/2820-148-0x000000001E8C0000-0x000000001E8E2000-memory.dmp upx behavioral1/memory/2820-147-0x000000001EA40000-0x000000001EA71000-memory.dmp upx behavioral1/memory/2820-146-0x0000000000390000-0x00000000003A0000-memory.dmp upx behavioral1/memory/2820-145-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/960-222-0x000000001E000000-0x000000001E254000-memory.dmp upx behavioral1/memory/960-234-0x000000001E8C0000-0x000000001E8E2000-memory.dmp upx behavioral1/memory/960-228-0x0000000010000000-0x000000001004F000-memory.dmp upx behavioral1/memory/960-237-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral1/memory/960-243-0x000000001E800000-0x000000001E84D000-memory.dmp upx behavioral1/memory/960-239-0x0000000000360000-0x00000000003CE000-memory.dmp upx behavioral1/memory/960-246-0x00000000002C0000-0x00000000002D0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwo6 = "C:\\Users\\Admin\\AppData\\Roaming\\pwo6\\svchost.exe" mimic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2820 mimic.exe 960 svchost.exe 1504 winlogon.exe 1504 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2820 mimic.exe Token: SeDebugPrivilege 960 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 960 svchost.exe 960 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2820 2520 mimic.exe 31 PID 2520 wrote to memory of 2820 2520 mimic.exe 31 PID 2520 wrote to memory of 2820 2520 mimic.exe 31 PID 2520 wrote to memory of 2820 2520 mimic.exe 31 PID 2820 wrote to memory of 1600 2820 mimic.exe 34 PID 2820 wrote to memory of 1600 2820 mimic.exe 34 PID 2820 wrote to memory of 1600 2820 mimic.exe 34 PID 2820 wrote to memory of 1600 2820 mimic.exe 34 PID 1600 wrote to memory of 960 1600 svchost.exe 35 PID 1600 wrote to memory of 960 1600 svchost.exe 35 PID 1600 wrote to memory of 960 1600 svchost.exe 35 PID 1600 wrote to memory of 960 1600 svchost.exe 35 PID 960 wrote to memory of 1504 960 svchost.exe 36 PID 960 wrote to memory of 1504 960 svchost.exe 36 PID 960 wrote to memory of 1504 960 svchost.exe 36 PID 960 wrote to memory of 1504 960 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\mimic.exe"C:\Users\Admin\AppData\Local\Temp\mimic.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\mimic.exe"C:\Users\Admin\AppData\Local\Temp\mimic.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\pwo6\svchost.exeC:\Users\Admin\AppData\Roaming\pwo6\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Roaming\pwo6\svchost.exeC:\Users\Admin\AppData\Roaming\pwo6\svchost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\_MEI16002\bin\winlogon.exeC:\Users\Admin\AppData\Local\Temp\_MEI16002\bin\winlogon.exe -SOCKSPort 33156 -ControlPort 33157 -DataDirectory C:\Users\Admin\AppData\Roaming\pwo65⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ddf742c6c8f900158564a4cdd2e1ed5e
SHA178b20c4949bce6ee45715a818e139fe9ad1ed8bc
SHA256ae4abcf0a4c8b79018f4b6d545809e8cdeaa454375151b13ed5236ca27682b01
SHA512957f48c22eb0cdf5e6e51569dbb58e29efe8e4acf69334443c5e8936fcddfbd7a7e4537005b64664c24555319458ed1fb21ab5cf023d32812b1328eb13e8ace0
-
Filesize
104KB
MD521917b2f3bb8366103f60675db9cda3f
SHA15be1d08ff1c156faedf8761dfd8095f5154c43c6
SHA25627acc2baf1b3d5b7f7ed360ad4334e43cb86a3e3de5a9e5df1960bb26120b02d
SHA512f914363fdba5e4a2473fb449948df4e32d134a7369a9df54268ef5393ef0aa84a89859a3b88a7c03bc0808b7571ed1a3f7fd053a33a8862b5f74d6daccf03046
-
Filesize
13KB
MD5f878c3ea3e3f61091ea5889428eb56ed
SHA1b3016899328c19a54accc342fe96b612e42afe85
SHA256c9b85ab25fe2a60f058ff875c0bb03f885c3988d480621449fbe0755a015156d
SHA512192090eab534ae906b2f3440e7b19d4495f01c02ef59169d10d6009b3343da7251d69595d469590307e2631b91d43604779ffa8579dc9791dd1e09b4de8644d2
-
Filesize
18KB
MD5c4326ac83afd464cfe5acc3c392ec038
SHA10449572ffd71bd3222d470c37cc6a2a4810e835b
SHA256682372936163cbd44da05d56958142f9b475756a1a90ac1b5520687f2a74fb74
SHA512a65bdc52e2165fdfd9eeeb32d5e8d641724881412f1b399a5c1fe5895284394e10cac566e08c35cf7238f4a1a42adde592500d16b12fa76eaf0b58ed19c10219
-
Filesize
264KB
MD5b5c856714deb16a1ce8f41ed71e00e58
SHA17cbba017e85c438c938b8bbd3afbe4dc56625a89
SHA256079dd93c4abc33295ea8b2cfd4d52d32e9dd61f1d0596dd3b6b5544a0169e2d9
SHA512bc7aec1e2cd9ef0c962cf246fba1481c82e2746798410df8808714b0bf160744c73fe99a2ae2ba29fa2d4917d59d82fabed65cacb32f861ea5f6fbe744e2b1b6
-
Filesize
56KB
MD5d9fee3a6bb8aec510dbec5a55fbc3d16
SHA18600102a3604a30ad917787eaca772c7de9d140f
SHA2567244a58eb526bb275d3fe7fa9ceb7b3dbe921f937eddfb7de4866eb5fe2cd6b2
SHA512fea532a13be386a57fc0db20a0cfe1b69203f791f2fcb7471215ec1df0e31f1325fa66f37d5a982ab8afeff30f06d6c1879849c69a3acb0bc8a3c87748ed942b
-
Filesize
133KB
MD592a833a8d5cd5ee0d2867f7e9dac1ae2
SHA1d736583f854462f316e8a8a831371ea0867f3c29
SHA256d528726d30bb4b4779729461a2d21348feaa7985507128e6b41cab3320807726
SHA512ec73ebcd8cd48af59b8f926a5eb95bf1ca4e04e0c4bf6cc73cadd87d6c0b4d86b9bacaf859c84f70b54b2b740a5a5752fdd8f8fa060c1633201dcb122bf0affd
-
Filesize
58KB
MD54af723714e507fe7e1456ef127628db0
SHA19ef270adb5c41f83fad02750cd359395e79a1094
SHA256b29ae337e386c9e3244e39418b4c5f4b931896b8317f28c5b955b005be474d4c
SHA51271934f270b13daa9815f0ac48ad7f46653c4c4a6f39f2dd9de6642b42bcdf4e6d4c25bcd122c192f20dbac7d6a686e8641a2cc31046c6dff7a28875161ccf71d
-
Filesize
18KB
MD5e08b4d34c1fe73345990a6c419b40a05
SHA1f5972c3167a841d7a6741488266eff2df6b559f1
SHA256ee19e9e64d11f3932b280a0bd86ab5417a1260559c8107f663f1d909fee2712b
SHA512d1fbd5cd443b6be2d045ada1d8aab3dde5ce25db8aed6cc9a48058ade69be859310141fe226a841e18537d62013a5af07c7e69eaa2487bc357493701405580ac
-
Filesize
20KB
MD55c866ba4d12ad465bd8bcc30909f114c
SHA1a3d33c887e7299df13611d0ec73d0ffb044f2bba
SHA2566e7da932220f6c7198251a7ecaca6524e534b7fb7a56b9179fdb8333ff7885a9
SHA5129c2914794b3f25a9dc4d14d7baf41baae52b05bd6d008d71a60db32db10767344c5a10ee76af057e01d97b564bfdf3f299879eae0ca8e9579805873424ec00b9
-
Filesize
13KB
MD52209d7d989a6540beb27c73cd37de0b9
SHA18a626b2e04f4da8d395e59c6ea2a655915b7572c
SHA2565e9c03a81e1d0b7b307e4f0bed7ca6ec43ab4b233b957a772d5a2cfd6c31e358
SHA5121013226bd500671f33d30e1d22e95f2baaf59c4d099b79934385892bb883ca73a265aeb38c65a202ab8dac1e2a7d95a1a8702889dc38e412dbd403799b556ce2
-
Filesize
851KB
MD574305738e630aa757f1072c6c9d50f11
SHA15a9fec6abb9206bf6c64b9b8af5a49cce3bbfcb7
SHA256e169f756f13fe290d86532385167c249a1ce28035dc80ed15ca93f3239dff1c8
SHA5129e885e0680f503e280eb40dee814e3794430ab5288cb4370e0ad3b13507cfe38c2e8d736ff225422b369a3c55a96db58e60ceb559d7da2a42ed89b122bd8b0d9
-
Filesize
109KB
MD5123a6d0b4dcb3ca738fa67a9fd04acc3
SHA115d7f270e39d0b2bb2b3701b51fd63e5c6da0726
SHA25614c07a4a75ac8bbee303310a44452e219c8fb0b0c9e50aed8c1883d864a3b75d
SHA51284431e1b4300fa195430d4da4738facb4e8925045e998ca0dc8da5ba05f7ccf7f8a32e6553c12eb69a324ae3b13580ea91fcbbd1c612b84e891a7022dd77a829
-
Filesize
33KB
MD500aa1eacd754a29ac91324427cdf4e7e
SHA114cf21774a76083d6b26784071c6dd9750d50510
SHA2560358a9a94f9489267923d78536f1fd55b81ff06fabdd6d1e700cca89e8165bf2
SHA5120f85796fcb250e8db87015ceea57e25c18269de3597472cd2238b28a6662135950ed587995d686a3ee3dfd34827fe7fe6e2c08beb8be2afe7b30492a8ff4695e
-
Filesize
34KB
MD5233e204cdd364c4b2a4fbbb3b310abf0
SHA1cf4263989e3098330b2b7e2e37df547ad65022e0
SHA256a8501fec10d3ada36d01aac09185a8312dca7d19d09bbea598486edc316d6898
SHA5127bcb8565f6d2e781e554521791b21b237b5badf6843b412f1b0798891efd8144599af3a886bf610d831da1849c243c3cf1068e12aca357b5bd39585c53492a20
-
Filesize
20KB
MD5af564cdf235c69b0c8ee5c9e2465b685
SHA146506d46cac4c22d8ec066adab1b746f9923879f
SHA2568835001363ac5004118b9d345ad514d65112d40a0fc03d8cc93a92e27b936efe
SHA5128eb9b6b3ad3697d2ce1f71f0027428e4d12f25cac9844707d0b56262bdf6d9d8802e6de8163a724d628168e4c91585678651986140cd67ff6ce08b52e3652139
-
Filesize
51KB
MD5b5a143bbf97a0e53a60a5071da7e332c
SHA1f6158de44430a29c61c6117d77b0db87ad528f59
SHA2568596ede6ab99d6e18bcf3d298b08cdd09d3076634a2ec89aa2d41624a1d3969b
SHA512728af5782e9936c64bc5d62ce9960c942b5d60f635ff926a3ad884c179220c6550ab7d2e24caf330c4c487e14aad9aec95dfddf017d0154ea0e17ea4ea6c6202
-
Filesize
9KB
MD53449bbfac55bfa14cdfd83e2d90f3d7e
SHA16bd778f81d672453b06e09dd405bd45e22062a70
SHA256edccb048476f4b029eb3e675b16e0cfbe0bbc4d795977e4c7fcf6ae520d453f1
SHA5122eebe36f2ff1b60667f242840d7c6b2ab9507a9212a1ef8b8f4916b07667e1235c288edf2157183b2bda575462f3e4f128329db26539512a9b51c5c62436153f
-
Filesize
70KB
MD5311af8755345d435a435fa96a55f2145
SHA1b34a19d4d1524e6bcfe84e770c484ee0e227407a
SHA2567cfdcc1fea438e0b06864369605d0291ea12e6598306f80d27ccb23e122e9e49
SHA5126ac98e95f597d1a6dbcafe8c68ff46256d19b507fda367f789ea9bb220e6f9f1253e81ec18e3aa67092c06c2fbef03aae9eb2a277c6dce6aa9c17199d3a4ef2c
-
Filesize
42KB
MD521d919030a29f626219b3da21d75bd30
SHA1e753fcedbee130b9c51fb39d82a35b0e975e1e7c
SHA2567a79a5c601d280177ab7f4a9f5bb20d5199aafcc4ea9acbc549bcc1a89eb04a8
SHA512fd939f1a81fbbff93ffda51bfda8a9886a512bb0c4c3a2b50f408cf0ae7f34d6f8d68514170b2a4f575ee8adc67e46987068a1b735385446db1586429d1d51b0
-
Filesize
7.0MB
MD5cda13c6a7a6b9ca42a6142a9606c469d
SHA1ec3ecd5ad0917376034690f619018492960a1e15
SHA2560492c19f21fae3e2718a78444f2811d6b3524bdecc16a8dcbfe8b0e16df7a38e
SHA51248a0614508b6937d56b7ce70d0cd6b06f7a6e284a0c6c71d056aecef1629e31c2aee612081a02cdde395f3c2dc8930840ba0c8d7ec27c9c1afc4fae6930ddfea