WSPStartup
Behavioral task
behavioral1
Sample
7642cc292f19cf8d8635195045d9a19db42e8f4e63bd27609b40d1e2aa11f52c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7642cc292f19cf8d8635195045d9a19db42e8f4e63bd27609b40d1e2aa11f52c.dll
Resource
win10v2004-20220812-en
General
-
Target
7642cc292f19cf8d8635195045d9a19db42e8f4e63bd27609b40d1e2aa11f52c
-
Size
141KB
-
MD5
37372834534481211663ff301968a2ff
-
SHA1
4dc8d3fec3f6641eb10f164bc1d5203c3068e05e
-
SHA256
7642cc292f19cf8d8635195045d9a19db42e8f4e63bd27609b40d1e2aa11f52c
-
SHA512
e506ad02a1244b13640a64c89e54b8de7341a62429c783b958d9449570a458d39c0cfb9c99170a3d13581d5de1c86679bc3b6707c54eb1f852871b85e6edcd6c
-
SSDEEP
3072:HRxvxNhkSrWHCZKwjgLOghFFpW4XC3dUxAuLTimiBNs:/vxdWsK1zFOdUNTUq
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
7642cc292f19cf8d8635195045d9a19db42e8f4e63bd27609b40d1e2aa11f52c.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 164KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ