Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:18

General

  • Target

    290e4313e96cd8b848ce929ef4f99d8aacef6fc83ec5564aa3ebc506f70cef72.exe

  • Size

    8.4MB

  • MD5

    6ad00a1da7f5826c8d727bd0df707845

  • SHA1

    af48e844cd90123c47e3d9f6ac4bc0ef23a0265f

  • SHA256

    290e4313e96cd8b848ce929ef4f99d8aacef6fc83ec5564aa3ebc506f70cef72

  • SHA512

    bed2166c0df9cd10dd42a9f268cf83d98890c4a254ea892362e394d7810fc4ad314d3c7ff1d7607a4100f2d4068417c9aad8f9ddf5fe5300a45a0a8843bae159

  • SSDEEP

    196608:2+vTRg/dae+vTO+vTRg/dahWh+vTRg/dahS+l+vTRg/dahWrZ:bTRgMTTDTRgMhWYTRgMhUTRgMhWrZ

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\290e4313e96cd8b848ce929ef4f99d8aacef6fc83ec5564aa3ebc506f70cef72.exe
    "C:\Users\Admin\AppData\Local\Temp\290e4313e96cd8b848ce929ef4f99d8aacef6fc83ec5564aa3ebc506f70cef72.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ktiC76B.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • C:\Users\Admin\AppData\Local\Temp\ktiC76B.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/3404-132-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3404-135-0x0000000000A10000-0x0000000000A83000-memory.dmp

    Filesize

    460KB

  • memory/3404-136-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3404-137-0x0000000000A10000-0x0000000000A83000-memory.dmp

    Filesize

    460KB