Analysis Overview
SHA256
5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42
Threat Level: Shows suspicious behavior
The file 5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42 was found to be: Shows suspicious behavior.
Malicious Activity Summary
ACProtect 1.3x - 1.4x DLL software
Loads dropped DLL
Checks installed software on the system
UPX packed file
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-10 06:53
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-10 06:53
Reported
2024-11-10 06:56
Platform
win7-20240729-en
Max time kernel
147s
Max time network
148s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Checks installed software on the system
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe
"C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe"
Network
| Country | Destination | Domain | Proto |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| US | 8.8.8.8:53 | 2023.ipchaxun.com | udp |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| US | 8.8.8.8:53 | searchplugin.csdn.net | udp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp |
Files
\Users\Admin\AppData\Roaming\z.dll
| MD5 | 849e9f3e59daf750db838e885d58c6fa |
| SHA1 | 733cb105153e4b83160a52bfa2ddd95d750fb806 |
| SHA256 | f94949a6c121a525f661dd8abd917eb37a5cf582c89e3a258170a15d30cc0cc2 |
| SHA512 | 3feff6db5fc5ae371a4ec60ce13a383668a5accac537a0ae56b9b5b7318a2d5bdb4b79286a519cad3610cb6d1f335a11c09a4d3165c147a00d5a7880ea23e173 |
memory/2636-3-0x0000000010000000-0x0000000010014000-memory.dmp
memory/2636-10-0x0000000000CE1000-0x0000000000CE2000-memory.dmp
memory/2636-4-0x0000000002CD0000-0x0000000002DD9000-memory.dmp
memory/2636-12-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-11-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-13-0x0000000000390000-0x00000000003A8000-memory.dmp
memory/2636-14-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-15-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-16-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-17-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-18-0x0000000010000000-0x0000000010014000-memory.dmp
memory/2636-22-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-21-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-23-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-24-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-25-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-26-0x0000000010000000-0x0000000010014000-memory.dmp
memory/2636-27-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-30-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-31-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-35-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-36-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-38-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
memory/2636-40-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-41-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-43-0x0000000000CE0000-0x0000000000F2D000-memory.dmp
C:\Users\Admin\Documents\conf.ini
| MD5 | 3d0dd1232f57d57872560ae8727c5a4f |
| SHA1 | dadcf52337f2269136e962347cc6de9ae7912dc8 |
| SHA256 | 726efd919301fcc5803fbe842a634faf8be2f5273a2f44e73b714ad47e92353f |
| SHA512 | fded1e797ebf90a671cb0fa50d73962cc039306b7a66054e87527d044ff44c2d36d6f316e1d72f81db0856a70d88dc1b6dd154566a1419f0a0daa4917d4b9d8f |
memory/2636-46-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-47-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-50-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-51-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-55-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-56-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-60-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-61-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-64-0x0000000000420000-0x0000000000483000-memory.dmp
memory/2636-65-0x0000000000420000-0x0000000000483000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-10 06:53
Reported
2024-11-10 06:56
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Checks installed software on the system
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe
"C:\Users\Admin\AppData\Local\Temp\5b696394b74ff55bc8edfa800552abfb3dae5228a2d31f7fdd0fbdf5e4ab6e42.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| US | 8.8.8.8:53 | 139.221.238.206.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2023.ipchaxun.com | udp |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | searchplugin.csdn.net | udp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp | |
| CN | 60.221.231.169:443 | 2023.ipchaxun.com | tcp |
| CN | 124.70.37.167:443 | searchplugin.csdn.net | tcp |
| HK | 206.238.221.139:3760 | tcp | |
| CN | 203.107.1.33:80 | tcp |
Files
C:\Users\Admin\AppData\Roaming\z.dll
| MD5 | 849e9f3e59daf750db838e885d58c6fa |
| SHA1 | 733cb105153e4b83160a52bfa2ddd95d750fb806 |
| SHA256 | f94949a6c121a525f661dd8abd917eb37a5cf582c89e3a258170a15d30cc0cc2 |
| SHA512 | 3feff6db5fc5ae371a4ec60ce13a383668a5accac537a0ae56b9b5b7318a2d5bdb4b79286a519cad3610cb6d1f335a11c09a4d3165c147a00d5a7880ea23e173 |
memory/4976-3-0x0000000010000000-0x0000000010014000-memory.dmp
memory/4976-4-0x0000000001BE0000-0x0000000001C07000-memory.dmp
memory/4976-6-0x0000000003C30000-0x0000000003D39000-memory.dmp
memory/4976-12-0x0000000000FE1000-0x0000000000FE2000-memory.dmp
memory/4976-13-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-14-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-15-0x0000000003540000-0x0000000003558000-memory.dmp
memory/4976-16-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-17-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-18-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-19-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-20-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-21-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-22-0x0000000010000000-0x0000000010014000-memory.dmp
memory/4976-30-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-29-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-28-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-27-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-26-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-31-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-32-0x0000000010000000-0x0000000010014000-memory.dmp
memory/4976-33-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-37-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-38-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-40-0x0000000000FE0000-0x000000000122D000-memory.dmp
memory/4976-43-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-44-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-48-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-50-0x0000000003570000-0x00000000035D3000-memory.dmp
C:\Users\Admin\Documents\conf.ini
| MD5 | 3d0dd1232f57d57872560ae8727c5a4f |
| SHA1 | dadcf52337f2269136e962347cc6de9ae7912dc8 |
| SHA256 | 726efd919301fcc5803fbe842a634faf8be2f5273a2f44e73b714ad47e92353f |
| SHA512 | fded1e797ebf90a671cb0fa50d73962cc039306b7a66054e87527d044ff44c2d36d6f316e1d72f81db0856a70d88dc1b6dd154566a1419f0a0daa4917d4b9d8f |
memory/4976-54-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-55-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-59-0x0000000003570000-0x00000000035D3000-memory.dmp
memory/4976-60-0x0000000003570000-0x00000000035D3000-memory.dmp