Analysis

  • max time kernel
    43s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    43c3168417fd6625a6249ac3d9f708ac13c0b9769ccc475047a4e0dff8a53ea2.exe

  • Size

    333KB

  • MD5

    0268edfbbcfeb1c39988d3a5aa585a50

  • SHA1

    a9e357a8f598af8973f2dd70e7cb03c168772bde

  • SHA256

    43c3168417fd6625a6249ac3d9f708ac13c0b9769ccc475047a4e0dff8a53ea2

  • SHA512

    1ea38fc58f1ab69a32184f43693d27f94f18ee6fcc6f37484893bae7384c37640e9589f959e5d14fd12590c20ace61fbb1f2734ff0aeb2c498a0708f4777bfe3

  • SSDEEP

    6144:fsjhG5e3v5mjsFL/ko7mIjCQ+1S/w6le9y3Aq+PznjeKMr0CsFoUXZ2hf:h5eRKa/koSIjC91SySAxjedrAoUXY1

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43c3168417fd6625a6249ac3d9f708ac13c0b9769ccc475047a4e0dff8a53ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\43c3168417fd6625a6249ac3d9f708ac13c0b9769ccc475047a4e0dff8a53ea2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hck144C.tmp
    Filesize

    172KB

    MD5

    4f407b29d53e9eb54e22d096fce82aa7

    SHA1

    a4ee25b066cac19ff679dd491f5791652bb71185

    SHA256

    cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc

    SHA512

    325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183

  • memory/1696-54-0x0000000000400000-0x000000000044D000-memory.dmp
    Filesize

    308KB

  • memory/1696-56-0x00000000002A0000-0x0000000000314000-memory.dmp
    Filesize

    464KB

  • memory/1696-57-0x0000000000400000-0x000000000044D000-memory.dmp
    Filesize

    308KB

  • memory/1696-58-0x00000000002A0000-0x0000000000314000-memory.dmp
    Filesize

    464KB