Behavioral task
behavioral1
Sample
c4e096991428cfaee73e4e3714db0ab8ac1df8fa1a69812dcb3091ae3af9b87f.dll
Resource
win7-20220812-en
General
-
Target
c4e096991428cfaee73e4e3714db0ab8ac1df8fa1a69812dcb3091ae3af9b87f
-
Size
156KB
-
MD5
2df48a81140c6a506af7ef0ce0fd73a0
-
SHA1
cd93f36d57540ba62066317111d36e118084afb1
-
SHA256
c4e096991428cfaee73e4e3714db0ab8ac1df8fa1a69812dcb3091ae3af9b87f
-
SHA512
561a52b5afec25137e13d0b11ee3dc131bad64037e6fe95265663bb540c8a0e5576faca6b05339451b9141bfa3fb5ea93bea4199f77f8750fbe59249a49b49ac
-
SSDEEP
3072:utTr9Tly9IMBRXNmBocc42Xfjs78523sST+7UZ27hi8f9rpqymYrWvCsEEQGXY:W1lEIMBRdmBCBXfjs7YSTXOhFlrpq6iS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
c4e096991428cfaee73e4e3714db0ab8ac1df8fa1a69812dcb3091ae3af9b87f.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 14KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ