Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 01:25

General

  • Target

    a9f3b8a813d7077825f0c17f9cbcff86ca1b883413675badd7adc00d5221dd01.exe

  • Size

    532KB

  • MD5

    3c00accded5db6b17070663be4e2725a

  • SHA1

    680d4a496abab8e1a4c61ea0e488dffab1db1416

  • SHA256

    a9f3b8a813d7077825f0c17f9cbcff86ca1b883413675badd7adc00d5221dd01

  • SHA512

    154317933533fc93d9e50c9a2f23682a90b9014dd317f34a5b026e9abafc3561ead619f5642ec1c3a50a7640020623d2cf57b360e9ae1f8e1d2f6d4b63bf7abb

  • SSDEEP

    12288:gCmLpJTyNXSYoGkZCOLpn45/MQ51dqhkKq:gCmtJTyN0pCOtn45/jzQhk9

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 37 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f3b8a813d7077825f0c17f9cbcff86ca1b883413675badd7adc00d5221dd01.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f3b8a813d7077825f0c17f9cbcff86ca1b883413675badd7adc00d5221dd01.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\setup.exe
      C:\Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\setup.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 "C:\Program Files (x86)\wsearch\searchm.dll" -s
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:1448
      • C:\Program Files (x86)\wsearch\Search.exe
        "C:\Program Files (x86)\wsearch\Search.exe" us
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1556
    • C:\Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\setup_s86.exe
      C:\Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\setup_s86.exe /S /R0
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\setup_s86.exe
        C:\Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\setup_s86.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Windows\SysWOW64\rundll32.exe
          C:\PROGRA~2\MMSASS~1\MMSASS~1.DLL,EasyFunc
          4⤵
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          PID:2964
        • C:\Windows\SysWOW64\rundll32.exe
          C:\PROGRA~2\MMSASS~1\MMSASS~1.DLL,EasyFunc
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1208
      • C:\Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\setup_01cncw01.exe
        C:\Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\setup_01cncw01.exe /S /R0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s dtservice.dll /S /R0
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\MMSASS~1\mms.ini

    Filesize

    109B

    MD5

    6e30f8f2fe8d7db530e8a3ee56148f71

    SHA1

    bc1692fa78eba3eea4af73e04124a43aa60f48a0

    SHA256

    0c4bf097293013f20f2d8b79756c049ecd31b78e55079a3055490b7f9c1ae4c8

    SHA512

    5182f43107d5872d9438a13161e0e96d9d0e1df9f9c2ca6e15015e2b9f8b07011440abb69fdc1c7de421436414155f7ecbda2d0b42f35bb7bcc36dff8c54a4d5

  • C:\Program Files (x86)\wsearch\Mouse1.dll

    Filesize

    64KB

    MD5

    23dc474fa7d3f168893a0636ec39e8b3

    SHA1

    1d20d251dde02aaa1b34c8681f7a2f60b5af98cf

    SHA256

    b7063981dc266732e4cc464a07f2eca1e2b0aa5cb8d792199051bd7771a0661a

    SHA512

    75e43e5963b07da4550416593453557a789041f5a662071de59a49f0cffa8fae748b1ab02f464f24a8facdc078923834b0a4ee23309b6c7438a06ba2ffe47097

  • C:\Program Files (x86)\wsearch\searchm.dll

    Filesize

    40KB

    MD5

    e087ca7bd81e37c81f825eb6418ab004

    SHA1

    cb97cdf077624ac84c0c091b85f0af5a219217c0

    SHA256

    6c5170a251cc9276c0568ad07aad23524efa8362f2b7a58cc0b0b76c92c11858

    SHA512

    f36b074cdd541394f96d2d8ebee29baa83b5913973d6b742f79e78f869ee87a197e41f3a2639692733e9413466144590b9a5488a97918421b9b63ff9fcd50530

  • C:\Program Files (x86)\wsearch\sysadInfo.ini

    Filesize

    25B

    MD5

    598e9b90b57c0153e34c30332f044c9a

    SHA1

    775d3e64d21c5f4d1023bd05ffe638eadc7e1474

    SHA256

    c504fc16c030f1a80a770b912395c5dd2966a9b18149ae456096d60ba67e4b96

    SHA512

    48ae053006b3eba2f9bd995feae7f4d71301ab7eabeb4200f24c85722c74c8099ca5dbc8622314dc64b2c6f0905918a00984c91732e2fcfd9fc6ce9817fd2e36

  • C:\Program Files (x86)\wsearch\sysadInfo.ini

    Filesize

    47B

    MD5

    7d29a67301e7733e431f2dea9122e907

    SHA1

    b5a47348aed9d914199a46b0db051d10b87f3ed0

    SHA256

    c4a476630be920afc418e43debff3d51c13ecc334b63c19d4e4754eb5698cefb

    SHA512

    801b1468ecf55748e911147126afceec2982c32fb3dda9c35cc0224cbb20549a368c2063eaef165c176aae0a030b5c56ed5ab339a8a36d4de83e243d6f037fab

  • C:\Program Files (x86)\wsearch\sysupdate.ini

    Filesize

    63B

    MD5

    a3c6f56e44fd905ccddaa02484cf2864

    SHA1

    fff91ff19af16ba4c6e579a4d8e5612b609fed3a

    SHA256

    a7568b4423a2a024ad327016632c76c79a8d2df62119de90b67e8ade236816c9

    SHA512

    1060cbb7603c063fcd931d166382a85981abfbb85a926704c3092116ce55d58490e2754af3be2d5848469f5c2cd6e35728455fb0e9af8da26930a4209a1c5332

  • \Program Files (x86)\MMSAssist\MMSAssist.dll

    Filesize

    35KB

    MD5

    0b2766051d9fdaab37ed2f5aa5375deb

    SHA1

    0fa903c94e2880918bef4a618e0d7cdbb20b0401

    SHA256

    5134d0f86c6f1af64ec6b634711833e0f706066acc668a2e57d9fff493383da9

    SHA512

    3be65597b50e278938a92a771a41a2c8ae3c5de978fafcf8e34ec2267b5dbeff2769869f235ba7eb4a57381972439fa02c7aaae71721b194202aa65f48cf29cf

  • \Program Files (x86)\wsearch\Search.exe

    Filesize

    128KB

    MD5

    38f7505baa41babeb4b674582eed4bd3

    SHA1

    943d339092953b7655e2ab2db78c578b3fcc6ece

    SHA256

    ed17df692787452404530ca05e5a33a215272ff95dfe3fc34162d7dd44fe6dd2

    SHA512

    9e1ea332a101106fa6cd6a730d00affc263e418f41a2b111a4212f363bd3dcc6a716e355ab7a79bc9ea16bc3f96beaad9062edcf3259368dd3669327be3b2a73

  • \Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\Setup_s86.exe

    Filesize

    62KB

    MD5

    2944145db28891a98dbe7a3bd53277f1

    SHA1

    eacdc784f0e7562f5f47be96c8de5bcfd1c62ecb

    SHA256

    f17995a576e8f03dd82e8b0359c74ae629bff9c8c9850fa19aae9a72a9c040b4

    SHA512

    95224c48a7a9210824011a93eaa4208ef8fd1ad0d702c5f49819d2e753f5105d92f492a9895e5418b6c38d55a219c7ef0b990ba17116b7c1933e8c42b1237a95

  • \Users\Admin\AppData\Local\Temp\348e6168-5966-4535-9fa2-6734ab6d3967\setup_01cncw01.exe

    Filesize

    65KB

    MD5

    9cba20149aa9b7caa99414655fc3fd26

    SHA1

    3f1ffdf865984bdef6c513e4ce280dbac893037c

    SHA256

    7cf861a4063807fecda85d37ca1f9effab6efa4ab2a5ec60ed89f407c72c5007

    SHA512

    e53e2895663a0c0b52c9e3c4a66cfd9ebeb28f9552ae2adcde1b6142866312ff5b8a9cad226f9ca9da39af74a8aa7e11b69d207ce29a5ee4a9765999616b0159

  • \Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\Setup_s86.exe

    Filesize

    240KB

    MD5

    7f9fbada8a80cee46962cb8f191db6f0

    SHA1

    0ae14944174981e89a08001a214b6cf5a1f1da59

    SHA256

    488d4bfad05e370516e92f6b824a8c751ea00d66a32ca0ebc5b05aca5e4d08f9

    SHA512

    6ba518c9a02835b8eb5621e7caaca6d5a805bc1e0c093ab41396c0fe3e4a286d136d7b83704b60591186fa2a9cea37462d9cafab20c3a9a11f9975b542fe0499

  • \Users\Admin\AppData\Local\Temp\5c4f49e3-42df-4a92-a98c-be051469f08b\setup.exe

    Filesize

    180KB

    MD5

    c132031b0cbdd0fd485efd0bbcd78c3e

    SHA1

    e7295c3c9a253bee169c8c0a997876895d7a9e9b

    SHA256

    c1ef5b4cc978d33ff628b31dab1be761db750967ca5f08a4b851b05ff7ec7f81

    SHA512

    8ef62e686aa9d501496b548b09d310fb14c2d8fa44ee458a42e6462d36142372550dd257d50b27f81d0033e6de5bb0baa0b09cddb0168735af0f99303ef1251d

  • memory/1208-132-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB

  • memory/2060-38-0x00000000002E0000-0x0000000000303000-memory.dmp

    Filesize

    140KB

  • memory/2772-138-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2772-141-0x0000000000240000-0x000000000024D000-memory.dmp

    Filesize

    52KB

  • memory/2772-50-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2772-51-0x0000000000240000-0x0000000000263000-memory.dmp

    Filesize

    140KB

  • memory/2772-52-0x0000000000240000-0x0000000000263000-memory.dmp

    Filesize

    140KB

  • memory/2772-53-0x0000000000240000-0x0000000000263000-memory.dmp

    Filesize

    140KB

  • memory/2956-120-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB

  • memory/2956-62-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB

  • memory/2964-133-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB