Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 19:42

General

  • Target

    f12fb050ec561f370b73dc35c3f4280290881ec2ecbab79bc829cfac2f6007e4.exe

  • Size

    197KB

  • MD5

    09106328a56a43f2a63128e81e561020

  • SHA1

    a1bc19dcde739c86cbc4b0ad3183c894d12e93f4

  • SHA256

    f12fb050ec561f370b73dc35c3f4280290881ec2ecbab79bc829cfac2f6007e4

  • SHA512

    ab74ab971b1e18796714cba48d96f326f1e2434c16f17a7b2f8e12db5f4f2779127cd8d2b926e0b4383ae660f0743faa87de019a985b23c3da39d359249ff9b2

  • SSDEEP

    6144:+f6xBKiC/ihBDmNqZ4Q9tn905ntheI5lP44:06rKD/ifDLZJ9t90XoIrP1

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f12fb050ec561f370b73dc35c3f4280290881ec2ecbab79bc829cfac2f6007e4.exe
    "C:\Users\Admin\AppData\Local\Temp\f12fb050ec561f370b73dc35c3f4280290881ec2ecbab79bc829cfac2f6007e4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\iki6854.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • C:\Users\Admin\AppData\Local\Temp\iki6854.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/2760-134-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2760-135-0x0000000002150000-0x00000000021C3000-memory.dmp

    Filesize

    460KB