Analysis

  • max time kernel
    45s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 19:42

General

  • Target

    e26a9e5c5332aaea27491796a57a1104998e6a974d7945d3fdc521be11a72957.exe

  • Size

    231KB

  • MD5

    0d062df7eff256f99d24b5c4f78fad70

  • SHA1

    ec15835eb1819c96669fe7e26f33efc65d73ffcb

  • SHA256

    e26a9e5c5332aaea27491796a57a1104998e6a974d7945d3fdc521be11a72957

  • SHA512

    8eca2bccd85667a2aa9809e95bff10ef09344005f109c026761cdd3d9e88fd74832122bf87730b906478878dd6d8bd4fdc2b9b0e5bb943da909e3e02c532ad19

  • SSDEEP

    6144:lL8WRVlMMMMM2MMMMMB0l4/dK3PeWv5hE8MbE14XCrGJxo:lLDRfMMMMM2MMMMMB06/dseIATXCrGJq

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e26a9e5c5332aaea27491796a57a1104998e6a974d7945d3fdc521be11a72957.exe
    "C:\Users\Admin\AppData\Local\Temp\e26a9e5c5332aaea27491796a57a1104998e6a974d7945d3fdc521be11a72957.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gwkE33E.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/1980-55-0x0000000001000000-0x0000000001012000-memory.dmp

    Filesize

    72KB

  • memory/1980-56-0x0000000000170000-0x00000000001E3000-memory.dmp

    Filesize

    460KB

  • memory/1980-57-0x0000000000170000-0x00000000001E3000-memory.dmp

    Filesize

    460KB