Analysis
-
max time kernel
143s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe
Resource
win10v2004-20220812-en
General
-
Target
8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe
-
Size
195KB
-
MD5
a2a7ceb50013f6790ccba1be4c38b241
-
SHA1
10d5c8becd109ad0c1b00ddf0d229f1f4cb61de2
-
SHA256
8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242
-
SHA512
70b2cd2874064c3f84808533d2015f1048e6cfdfd4055b7ee0a22290334ada3e46a535934ecf90f340202c41e9c8e911f0db0fa35c3e39b06173ed01cb8cb788
-
SSDEEP
3072:pBzYCRiP/dnTEzt8jfOqRhplx5+LgxmA1GNmy/UG7STyNKVeZMxgvcyAd4Yon:fJnOjfOqpKLwMNmy32+NKwJcm9
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000005c50-54.dat acprotect behavioral1/files/0x0007000000005c50-58.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe 1816 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1816 1192 WerFault.exe 26 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1816 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe 28 PID 1192 wrote to memory of 1816 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe 28 PID 1192 wrote to memory of 1816 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe 28 PID 1192 wrote to memory of 1816 1192 8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe"C:\Users\Admin\AppData\Local\Temp\8354a03a5b89d64be286cd87b673e785fc90fb09847dd369d897522873e61242.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 1642⤵
- Loads dropped DLL
- Program crash
PID:1816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9