Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:14
Behavioral task
behavioral1
Sample
eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe
Resource
win7-20240708-en
General
-
Target
eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe
-
Size
3.1MB
-
MD5
beca12bc7f563fb505de45ba4ae24c9d
-
SHA1
45bb176aa4096f0dd65ed93223542e3b573ac687
-
SHA256
eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9
-
SHA512
37ed07536181dac6457addfbf9b20210d62bb56df6036a214b6d1734264cd20bf5bd5df0a47bed21c232cf4e0be2350bbde686f972c1ac03c106390ecd95e501
-
SSDEEP
98304:tspZ9h5PgBQ+eAL5B6Pb2ap1Ktf5+36ZbBG8hi5FY:kZRPgBzLG6pg3OI8hcG
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b00000001225f-2.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2676 KillAlarmClient.exe 2852 Setup.exe -
Loads dropped DLL 13 IoCs
pid Process 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 2676 KillAlarmClient.exe 2676 KillAlarmClient.exe 2676 KillAlarmClient.exe 2676 KillAlarmClient.exe 2676 KillAlarmClient.exe 2852 Setup.exe 2852 Setup.exe 2852 Setup.exe 2852 Setup.exe 2852 Setup.exe -
resource yara_rule behavioral1/memory/2756-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2756-44-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KillAlarmClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2676 KillAlarmClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2756 wrote to memory of 2676 2756 eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe 31 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32 PID 2676 wrote to memory of 2852 2676 KillAlarmClient.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe"C:\Users\Admin\AppData\Local\Temp\eb521601f046f1d0a8fd317c5b8a34eb999821de61d3a1a692640aa4916b8dd9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KillAlarmClient.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KillAlarmClient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5a54917d9f46f7244a77df960ce801575
SHA144f8746d67ee8b41f9cd67238be6989ea75246ba
SHA256337b70d4146081d55c6f7a28d98d54a486032ee32f4bceb7a4d19e8e7969197b
SHA5123faf3937f0346b53a7eb0fb6800caa5fdd679ceb7ae858cfe269eaa13e33cc279de808fc30772fdd3b1bc3f6fe6e688fb757fe0b4dfaaf6def154116b401a528
-
Filesize
2.7MB
MD58059821048bce13a8eb82b303173071f
SHA1b0f7aa23d1693658a0d41c55339b535bb733a568
SHA256707641afc1539b3926ff1f5eac755dd0c5c86c4f10621b8ddccb986ad8188bca
SHA51215af1019e58357aab5333041dc8a26e773e08d58477d66ca089042465ef0a797382104a971f64e3e4e15cae0a021e2d4c82a0784032131397e379929cbae708b
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183
-
Filesize
53KB
MD561ef80d09fa0775dcaf597f68958586d
SHA1a52c2de166faf6c8d567b67dd3a6b1fcdda6be6c
SHA25662cc5a6c8971e1cb8178a9480a35f5d6262767c7c57d7f548cbbe042f290c8ba
SHA5128e2a1023fb9ba71ca56fbc7a0e96ea84843dc11546322c063f8c0a633152900bc24a96e328661f59647b9969debeff5f839664603c98d0227a00c85c89dfc54e