Analysis
-
max time kernel
130s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:22
Static task
static1
Behavioral task
behavioral1
Sample
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exe
Resource
win10v2004-20220901-en
General
-
Target
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exe
-
Size
192KB
-
MD5
8c266b8c43aaf48ea502514810049d2a
-
SHA1
312f51528b7b975a8a5945b5c4a90ae887bb3549
-
SHA256
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539
-
SHA512
9245a190d93242e29909fa41dff726f8af4483f60edfb3d49c92f7d414dd534881fb1851c2e70dd652b09133dd0f8518afacd9e345f5fe8152dabbcbb304585c
-
SSDEEP
6144:R3J2OLgFJ8eEfckivSyb5qiFJm/ZFUmA5v/k:RZ2OLgQzwLqym/ZFti/k
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\uykF7C8.tmp acprotect -
Loads dropped DLL 1 IoCs
Processes:
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exepid process 1504 768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exepid process 1504 768f9d7bce5ec2adbbca8e30c7f6c3e6b411f1542b0ad77fe22aecfbcf372539.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183