Analysis

  • max time kernel
    189s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:18

General

  • Target

    13697b4f08936f6fd318152a69ea5f8ba2a0d152c048b7ac356aaaa60f739b4e.exe

  • Size

    936KB

  • MD5

    cb937548f1c6a0dd7d9bf97a80d8f670

  • SHA1

    9de35431f8767e983a84a297b90f5969efc114a9

  • SHA256

    13697b4f08936f6fd318152a69ea5f8ba2a0d152c048b7ac356aaaa60f739b4e

  • SHA512

    64411028fb39147052475fb9e80964b60c3db89398f34865d4e3a01aa0fa36a1bbacdc270fb83a10475a082909521b49f98a8ee2316f28a385b1bd0fc5e03b4c

  • SSDEEP

    24576:L1sxy32EFKHzCY73b5uLBDLAB3Uyl2JLfC+MhVkq:L1sxM/Az/7tqBkDl2Al0q

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13697b4f08936f6fd318152a69ea5f8ba2a0d152c048b7ac356aaaa60f739b4e.exe
    "C:\Users\Admin\AppData\Local\Temp\13697b4f08936f6fd318152a69ea5f8ba2a0d152c048b7ac356aaaa60f739b4e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nci1889.tmp
    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • C:\Users\Admin\AppData\Local\Temp\nci1889.tmp
    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/2516-132-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2516-135-0x0000000000A20000-0x0000000000A93000-memory.dmp
    Filesize

    460KB

  • memory/2516-136-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2516-137-0x0000000000A20000-0x0000000000A93000-memory.dmp
    Filesize

    460KB