Analysis

  • max time kernel
    24s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 08:59

General

  • Target

    a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe

  • Size

    1.4MB

  • MD5

    699fcab38a36d60319f8c80da9111e36

  • SHA1

    5588d136e7bcabdc3c3ffc2601f8e4bf3e0de2b0

  • SHA256

    a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093

  • SHA512

    ca4ac9a32b73d40329b5e1b7e1a5aa57f1d8f40c7b134510497c1bdecdf60c5f8a14c98743db84de9f4b65391ff03382f2a5ae2001bd22f90759ac15ca250cb9

  • SSDEEP

    24576:wPPcicDjCIrWqspBgU8ZgjECEtT5s8wkWGjMwKcQNTEGc7/3PS+:wPGa3+gjSsYjMwKrTEGA/6

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe
    "C:\Users\Admin\AppData\Local\Temp\a142412f962adc69a71d6630a8542f27dc8dbb43b3b9a645f33c8461250e3093.exe"
    1⤵
    • Loads dropped DLL
    PID:1940

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\apmB2AD.tmp

          Filesize

          146KB

          MD5

          3d4839228c7ee77e28832879eeb17340

          SHA1

          ebe4a6388c8c6831837e232b48b8f4266b7f711e

          SHA256

          5d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954

          SHA512

          f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56

        • memory/1940-54-0x0000000075761000-0x0000000075763000-memory.dmp

          Filesize

          8KB

        • memory/1940-56-0x0000000010000000-0x000000001007E000-memory.dmp

          Filesize

          504KB