Analysis
-
max time kernel
42s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 03:47
Static task
static1
Behavioral task
behavioral1
Sample
31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe
Resource
win10v2004-20221111-en
General
-
Target
31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe
-
Size
1.6MB
-
MD5
eb0c5433fa50e36e7288feb8ea048069
-
SHA1
73fa89138da519ef9685d7c54f5cf03b94ab903b
-
SHA256
31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b
-
SHA512
f211cb051a9279408dd71c564d6ca2e5d8e251af5b4cc58328c4f1339bcc97cd56dc0d14f8f69e21863013c3db3c9759b4d9774caf6bd8285aa5719e7196ac4a
-
SSDEEP
49152:A0wOppvK6mTQWmT9Z6ks3hp3j8qtu0igMUCiUnB:A0pppvfmTDmT98ks3hRInxx1RnB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat acprotect -
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat upx behavioral1/memory/1764-58-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1764 31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\ddd.txt 31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1764 31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe 1764 31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe 1764 31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe"C:\Users\Admin\AppData\Local\Temp\31bcaa34d3d614d95f83ffac388bce2db373a0a51994ddc86b527b28d6fa758b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1764
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d