Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 22:04
Behavioral task
behavioral1
Sample
retun.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
retun.exe
Resource
win10v2004-20241007-en
General
-
Target
retun.exe
-
Size
200.0MB
-
MD5
57bfb36b08a68eacecc64d77211b69b9
-
SHA1
db6ef4199dc49868b3bf713915057e6721c8b7e5
-
SHA256
2f8c8adc872d77bf4cbc46bd3f197fe9a3f71f511b3bb9e8af96f83fd7f509e6
-
SHA512
bcb3119f72bda2b9a247bb695154055ad74708eb444d2bd25400847fe8112da9b8210d0df94f71b4daec18776ca1948d8702f17f766234830d0a4dcf811f2f7a
-
SSDEEP
196608:1W++z9hoy6EnWLL0kiR+dy/YXsK0hn6ksV5:1WXRWyuPMR+dyLhO5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000195a8-22.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1284 retun.exe -
resource yara_rule behavioral1/files/0x00050000000195a8-22.dat upx behavioral1/memory/1284-24-0x0000000074A20000-0x0000000074F2B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retun.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1336 AUDIODG.EXE Token: 33 1336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1336 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1284 2156 retun.exe 30 PID 2156 wrote to memory of 1284 2156 retun.exe 30 PID 2156 wrote to memory of 1284 2156 retun.exe 30 PID 2156 wrote to memory of 1284 2156 retun.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\retun.exe"C:\Users\Admin\AppData\Local\Temp\retun.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\retun.exe"C:\Users\Admin\AppData\Local\Temp\retun.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1284
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1256
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5bc5d15277419e8f86bb0074037bd359f
SHA11504051c83b0fee4c8988210b4d4dc32b84ada27
SHA256726575b0c9e1882e56d2b16580999246a735941353a528ac35afdc549059396b
SHA512a9ba3a4bc1dc20f38dfa38e72701bf6e66a6bd0caced43094301a05dfc3bb93a7ae6a989da54b98d5de7b11e317447ea6232a4af19531de6906f9c2cf45370c0