Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25/10/2022, 21:51

General

  • Target

    458cd4a84424b72ba8c9dfb1bee5df81871e5fde118de674ec0bd4e5f67cb897.exe

  • Size

    1.9MB

  • MD5

    95ffeafe46e97778692c079db601e14c

  • SHA1

    f55deeb7b5204344486757723c3ba94abaa24c73

  • SHA256

    458cd4a84424b72ba8c9dfb1bee5df81871e5fde118de674ec0bd4e5f67cb897

  • SHA512

    03c5aaa06a968116cb1f4b5fc824eef4b9fadef045dcb0e7fcc5daf27d8d9c34ea72b06c35abaa85edc170a734ce8d511526f44d39554226b13e51bd5039165a

  • SSDEEP

    49152:u5X1fUQoeFuQMY5TZaqdwk0c05HGiFqa:I9UQos5YqdwkLcHH

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\458cd4a84424b72ba8c9dfb1bee5df81871e5fde118de674ec0bd4e5f67cb897.exe
    "C:\Users\Admin\AppData\Local\Temp\458cd4a84424b72ba8c9dfb1bee5df81871e5fde118de674ec0bd4e5f67cb897.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

          Filesize

          86KB

          MD5

          147127382e001f495d1842ee7a9e7912

          SHA1

          92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b

          SHA256

          edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc

          SHA512

          97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d

        • memory/1368-54-0x0000000076461000-0x0000000076463000-memory.dmp

          Filesize

          8KB

        • memory/1368-56-0x0000000010000000-0x000000001003D000-memory.dmp

          Filesize

          244KB