Analysis
-
max time kernel
151s -
max time network
85s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win10-20220812-en
General
-
Target
sample.exe
-
Size
2.2MB
-
MD5
88af65ad6b23ee2f9745ddacff604748
-
SHA1
7636ea6f26c50379256b2507b7c21ecf45ad1d80
-
SHA256
641156d7dcbfa28f469a4df5e49c46efd4af299d418324cf108aa50aa7d7f2b0
-
SHA512
eface5855e358335336dadf3fda622a5609f0acacac10ab186a248c8b22e09ca1ed16e5d1d20021ba72950bb7189c3b3896c9adc513eb3caebca8bf8827b149e
-
SSDEEP
24576:29hQ8C9v6GzcSVh+fSXCi/Q5ZAi2JXbAa5PVtFqDaujMhPl6mfWIqvgVT6ppT:UqweDaaimr95XcDaujydPWIqoVT6/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000400000001a301-151.dat acprotect behavioral1/files/0x000900000001ac1a-154.dat acprotect -
resource yara_rule behavioral1/files/0x000400000001a301-151.dat upx behavioral1/memory/2584-156-0x0000000011000000-0x0000000011178000-memory.dmp upx behavioral1/files/0x000900000001ac1a-154.dat upx behavioral1/memory/2584-166-0x0000000012000000-0x000000001205F000-memory.dmp upx behavioral1/memory/2584-169-0x0000000011000000-0x0000000011178000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 2584 sample.exe 2584 sample.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe 2584 sample.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
618KB
MD57e1120e9859ef51ceb23f8c95ae76c5f
SHA17a8ee97008f3af5c198f108253a76f943ab7f2e1
SHA256d8f43a3e9e58577901a1eadb64bab038f58fb2b38dd577d0a8856e46f0230fbc
SHA512fbf0bb649102a04f1ae2ec5b169745f0303b4edf0b77e7fee6df8b7a34e6e271946d7c1c82ecc6f27a066832fb998aedf1112f3c884a836ffb5375d8ac97c208
-
Filesize
152KB
MD5186de2eaddf7aedc3c54296ab44d1161
SHA171380a0c8277a03304286d8a835c639020c0f3a3
SHA25607ed634c604a5b009aa718fc44b4aa42e55214c829ebbd7382ec385c295cdc8b
SHA5121366571bee8b91d34ccda16a044b03fa77dea9504f31d2b13454ea5ac1a575e61d3ae53352ae2b33217a471fe0d0b86a6f8b226bcabc439d2989d3ab1606036d