WSPStartup
Behavioral task
behavioral1
Sample
e60207b3231e061c8a154cbc1afe3e8904edb646bca4b2de6c418a3ce68c1f8c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e60207b3231e061c8a154cbc1afe3e8904edb646bca4b2de6c418a3ce68c1f8c.dll
Resource
win10v2004-20220812-en
General
-
Target
e60207b3231e061c8a154cbc1afe3e8904edb646bca4b2de6c418a3ce68c1f8c
-
Size
141KB
-
MD5
3a35d9ff4938d96fe64dcdff325565b1
-
SHA1
1d2df15e1e692cb19d206c206c7726a3eeed9f67
-
SHA256
e60207b3231e061c8a154cbc1afe3e8904edb646bca4b2de6c418a3ce68c1f8c
-
SHA512
7b15dfe68bb8c482a69c04b0642bc5fb7606f85fd4a8989eff9ccfca26ee9906725348e1f480b9cbfd7de80fcf41ea6f50eff1c64af27921c8578adf7afa8b49
-
SSDEEP
3072:HRxvxNhkSrWHCZKwjgLOghFFpW4XC3dUxAuLTimiBNZ:/vxdWsK1zFOdUNTUf
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e60207b3231e061c8a154cbc1afe3e8904edb646bca4b2de6c418a3ce68c1f8c.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 164KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ