Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 19:30
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
General
-
Target
Built.exe
-
Size
6.3MB
-
MD5
167d60bc914e36f9ab8e72b3801a9735
-
SHA1
88395156150b725970f6b95905321b347f1b5207
-
SHA256
2da43825dabc7fe762f5508df8190fcab3357e734aa67068663e6d664972854c
-
SHA512
603fd7b3997743265b99ffddc1adaff785688b2f80af4b89ee2e2eb70d2e8d4c4b80832d50e4791f5f5aff8a33ba03b0a9c8b7d71fd14055a2e5841b717fb824
-
SSDEEP
98304:RjcaCctL2KTRYABCh+gD4JREOk7XQ5PXH0YXG3FfNmbT2z/wly1/ULGDKhOh112y:TNWANgXX7glXHPINm2UyaLGm4fP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000193cc-21.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1492 Built.exe -
resource yara_rule behavioral1/files/0x00050000000193cc-21.dat upx behavioral1/memory/1492-23-0x00000000742C0000-0x00000000747D9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Built.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1492 2520 Built.exe 30 PID 2520 wrote to memory of 1492 2520 Built.exe 30 PID 2520 wrote to memory of 1492 2520 Built.exe 30 PID 2520 wrote to memory of 1492 2520 Built.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57ca7278aa7650b40a0b700e742aed573
SHA1991fed0d092c827d522daf5567e832ad856cd5a3
SHA2566c5d71412b3d6e6aa4d609feedae1ac245402a9bb1780dddd677bec781a843d3
SHA5124537b168f24c907e2b2f016f1e0327a049e5191ec91a2ee374048efb9246caa02bd7a4ac411cb75713c2793293a8ba05f36cb384467ee8bf51e2ae2281f7ebf9