Analysis

  • max time kernel
    49s
  • max time network
    71s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-05-2021 12:54

General

  • Target

    52d3c43dacc276383700465f951663df204fdc41ddfacb631dd50a2ea93ec85b.exe

  • Size

    796KB

  • MD5

    c38790bf200f274d3b030e7a9471d0cc

  • SHA1

    0f32afd5dc978001392811498da2090f315c6e98

  • SHA256

    52d3c43dacc276383700465f951663df204fdc41ddfacb631dd50a2ea93ec85b

  • SHA512

    059e47f830aca8dfa26d1e5af99bbec703293ca44f74cf58c6a427ddd3837039e8940dfe91e69f236078f672741c355b6e6494168bf5e05a7b111888c1b6fc42

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d3c43dacc276383700465f951663df204fdc41ddfacb631dd50a2ea93ec85b.exe
    "C:\Users\Admin\AppData\Local\Temp\52d3c43dacc276383700465f951663df204fdc41ddfacb631dd50a2ea93ec85b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pqlA696.tmp
    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • \Users\Admin\AppData\Local\Temp\pqlA696.tmp
    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c