Analysis
-
max time kernel
24s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe
Resource
win10v2004-20221111-en
General
-
Target
a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe
-
Size
1.4MB
-
MD5
699fcab38a36d60319f8c80da9111e36
-
SHA1
5588d136e7bcabdc3c3ffc2601f8e4bf3e0de2b0
-
SHA256
a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093
-
SHA512
ca4ac9a32b73d40329b5e1b7e1a5aa57f1d8f40c7b134510497c1bdecdf60c5f8a14c98743db84de9f4b65391ff03382f2a5ae2001bd22f90759ac15ca250cb9
-
SSDEEP
24576:wPPcicDjCIrWqspBgU8ZgjECEtT5s8wkWGjMwKcQNTEGc7/3PS+:wPGa3+gjSsYjMwKrTEGA/6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000012325-55.dat acprotect -
resource yara_rule behavioral1/files/0x000b000000012325-55.dat upx behavioral1/memory/1940-56-0x0000000010000000-0x000000001007E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1940 a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD53d4839228c7ee77e28832879eeb17340
SHA1ebe4a6388c8c6831837e232b48b8f4266b7f711e
SHA2565d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954
SHA512f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56