Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 19:09
Behavioral task
behavioral1
Sample
FPSBOOST.exe
Resource
win7-20240729-en
General
-
Target
FPSBOOST.exe
-
Size
10.3MB
-
MD5
fdbeed2c0af546f53441957458199c27
-
SHA1
600a194de3b25c11d4d3d0c2dfbc61802a2ff830
-
SHA256
909fd1bd50f9024e82c45d2fc28f6d9894f0a195e2aec3460cf0edec2dcdf905
-
SHA512
2b9bda660cca257857bf18eb7bc7eb5d6f37457027c53501c692bef254a6c6ab0c6efbc5fcf0e12c9bee644312b1b60ab1fd40519920e1f2cc54555bd0cac77a
-
SSDEEP
196608:kqin3DxOpJlXC4NmNumGOEJohaDjx4a0FAwYxM4hBX+S1kVqbvY1:kbnTxOpJUi/raMjm2BPhQS1tY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000500000001a4cf-45.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2868 FPSBOOST.exe -
resource yara_rule behavioral1/files/0x000500000001a4cf-45.dat upx behavioral1/memory/2868-47-0x0000000073E60000-0x00000000742E2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FPSBOOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FPSBOOST.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2868 1896 FPSBOOST.exe 30 PID 1896 wrote to memory of 2868 1896 FPSBOOST.exe 30 PID 1896 wrote to memory of 2868 1896 FPSBOOST.exe 30 PID 1896 wrote to memory of 2868 1896 FPSBOOST.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\FPSBOOST.exe"C:\Users\Admin\AppData\Local\Temp\FPSBOOST.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\FPSBOOST.exe"C:\Users\Admin\AppData\Local\Temp\FPSBOOST.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57cd78961972c635bbe49b29bb86e5726
SHA15677a224e3b1c27ffd05a6ccea6ffcbbdb42b3ef
SHA256e99fc9e98f769b903473ba46ab4a6019df3126d8d40184c369a91fdeb5a336ca
SHA5120dca58bea7a0297bbe7166b908ce4f6b2e0a85586492c3ba7f4aa8c75e12d3ca854040426a674ba5f75c2f53d407accda5ced56ce7166ca9a6ef40a1857ca145