Analysis
-
max time kernel
169s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe
Resource
win10v2004-20221111-en
General
-
Target
5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe
-
Size
4.2MB
-
MD5
e2da20c81ebf9ade750ecfd235f61539
-
SHA1
1429595c00ef118b928e1e8d7eef5dd941566f5e
-
SHA256
5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da
-
SHA512
0a13df34dfc7837b53aee4eef1a86ad8c739b7044838af549e3b48a97090def78eff060b861f355eea403615007428ad4d8ce9f2d914b801cfca2f8efeb059d1
-
SSDEEP
98304:LV59BWEKG4cyZz1agDvhKNaxWfpEjkaNOHgBJaJ9GVi+Y:x5vzKG2ZhS80ykaNOHLHGw+Y
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00070000000132f2-70.dat acprotect -
resource yara_rule behavioral1/files/0x00070000000132f2-70.dat upx behavioral1/memory/1648-71-0x0000000002760000-0x000000000279F000-memory.dmp upx -
Loads dropped DLL 9 IoCs
pid Process 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe 1648 5b8876a7cbdfa7683a4da6f3fd41d05478d74da9d4a3f3eb358c0c9783aeb0da.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD550b10397fb6caed2e4719747191c893d
SHA1026666fad34ad9f939da9184d6e84a8f0194ab21
SHA2562c235bf689a344c80b781c2d45c07af50d47508d430f2b27f75260277a9203f1
SHA512085ee2f7bd36e7b927c426d33cd1ad38bc9d07803362471db590fbfb4996bc95722544a8f321d8542ddd24b74214755c84d0efd03d50794a62288cd55808b8af
-
Filesize
60KB
MD5206396257b97bd275a90ce6c2c0c37fd
SHA13cae4506a033cf7e97156d5261f2a247c6270f42
SHA25664eef86745d7ae0168fec357099e2e952ce74ee19576d06cc8c8c65f210cc22c
SHA5124c23e52b5b23b305c3172e01dd205e15fda8f20f8b60776ba59d080bf05bbbca456a0ed232f2e2a2bf01d32efb913063f89fb4928bc4d5d1c1eb4c4979803455
-
Filesize
212KB
MD5f9a994df4d407bc79f7c84886fe7a654
SHA1c93e4be70794164b7b339218cc832ac94074d08e
SHA2562e9769ace867c79d5fcdda0eb2660c52b5e062c69b36add42d22eb0dddc4b3ee
SHA51241b1333ed08c10aaef3d766fec2d6b2fa4c79001d7ce18a06918c2aa8c4ade69018522882bfd4543add31efbef5e7bb450511f80dc9b580eb022cb7c406a820e
-
Filesize
95KB
MD574643bfcb5506297fc0a08baa172db15
SHA1d5b8d5a7b9ba10d346a28750f8bce0c5b9fa597b
SHA25697988664ef4449da37eb18f1c3df31a44a7decd581ae7e35e8078768fc957d9a
SHA5122a14130822ae0921885e03a4a10de39f9c40da71333036ec1b30747b93991c71d8ce65e6cdd29a77619d44b505489d2c231b498f660a1db0b392aa7f36717b4f
-
Filesize
128KB
MD507201b1fd5f8925dd49a4556ac3b5bab
SHA1a76afbb44376912f823f2b461507c28d2585a96c
SHA256abebbb0981d3d51eb63abcfa68be98da0cae4e6e3b143dd431fc845d1457dbd2
SHA5120cf673ce1b6cad38f0211231e876f00f6a8397a5f3e71680046f4a216bbe0f47f4541e5f5b49364310e41a04cce14703459725c3d9f052f9da13624e73753e12
-
Filesize
204KB
MD5856495a1605bfc7f62086d482b502c6f
SHA186ecc67a784bc69157d664850d489aab64f5f912
SHA2568c8254cb49f7287b97c7f952c81edabc9f11f3fa3f02f265e67d5741998cf0bf
SHA51235a6e580cd362c64f1e1f9c3439660bd980ec437bd8cabbdc49479ceb833cd8cb6c82d2fb747516d5cfcf2af0ba540bc01640171fbe3b4d0e0a3eeeaa69dd1d9
-
Filesize
1.2MB
MD5213f02d147385e48f60e96988cf73c45
SHA16331082d42bc4e845c514380c40fa1dc35201e7e
SHA256b0ccdc93d94eeebfb3166c9e8dba4d36e6151b7fe70032dd4feebfa28aabc7fa
SHA5121619764b2a9fcdd67707553cedc128bd14ee2e01bf8fd379de6d0de58bd3e8b73c631c1334c06d82ca5cebe292d9dcd788b701a4d47d022e60502aafed05df6a
-
Filesize
60KB
MD598174c8c2995000efbda01e1b86a1d4d
SHA17e71a5a029a203e4ab0afc68eee18c39f4ab4097
SHA25690284c2ead0598faa715cc90c1f53b83b916099c918ce7f816f0b4550ff55ac6
SHA512a37059062a99cd2a9fae15850b49068752ccf0be9f1d86c3f812a689b7c4d024771ec2b66adf9ce950bc5b8b117d457aba87d586cf112a1a30239531bfc8cd06
-
Filesize
72KB
MD5bd6eef5ea9a52a412a8f57490d8bd8e4
SHA1ab61ad7f66c5f6dfb8d28eba1833591469951870
SHA2560c9e6eb8648f4bf5c585d5344035e91c3249bb9686a302503b4681b7ba828dc0
SHA5121c43e50270eed071c8ef35e1c4695a93b9f98e668d4aebb44eb3b620efd2624b381554d2daf2d017f764b485e060abd589216043adea19eac94028ce66cc2025