pcixmm
Behavioral task
behavioral1
Sample
a4b5711a4d2e8e988daa3b105bf065131fa77c846968f4c8b37534d0fb274bbe.dll
Resource
win7-20220812-en
General
-
Target
a4b5711a4d2e8e988daa3b105bf065131fa77c846968f4c8b37534d0fb274bbe
-
Size
22KB
-
MD5
b30d948ead035e67abac2b6784cea710
-
SHA1
c36997c0ba776629e554263055de37a3994dbb90
-
SHA256
a4b5711a4d2e8e988daa3b105bf065131fa77c846968f4c8b37534d0fb274bbe
-
SHA512
350c8b2b2ea54be7d6d3e3e11c4dc894bfc9cd386cdb3592daf4300def386ee06b279b14048a9a9c26f9217ac6199398db8fc7fc6545f7054ad559ce0dc64675
-
SSDEEP
384:vb32XT3tjeyBB0oMMI4kvsfA//XtbMwxv8Ls2sImjjciIcFMLI:vKXZyGB0oNI4WF9ow8F7Ujci5K8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a4b5711a4d2e8e988daa3b105bf065131fa77c846968f4c8b37534d0fb274bbe.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 204KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ