Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2023, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe
Resource
win10v2004-20230220-en
General
-
Target
1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe
-
Size
1.8MB
-
MD5
4fb8b62c41d10b44b2da53d6f9cb2ec6
-
SHA1
db43213f122feb10f0e8bde5016b0e6c8a6bf4bd
-
SHA256
1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc
-
SHA512
4ddbcb1414c76657b1fcac868167ca58f1bd5fc2a65a86f8552b7513689b9c6c9791d617a12a0292c12cba292c72cf7bf0f825c6fee91682aeb0c64df98f0e7c
-
SSDEEP
24576:9+q9tmtTIbsWZbG5JyTEclF3Ie+AfloOELBb22xkd+gMjordTb/kTkn6z1jCvuQ:9+d8b5x9lVT1p2xs/b8Tkn6zRRQ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022f82-134.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 364 1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe -
resource yara_rule behavioral2/files/0x0008000000022f82-134.dat upx behavioral2/memory/364-138-0x0000000010000000-0x0000000010081000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 364 1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD510a2f663fdc511fd52bfcfd0a8837549
SHA1e3669af6eeb82c20b10245caa4974cb727b52bf0
SHA256bd5f2e4ac7c2bea616fa60a50698b0d6d46a9456c08392a5c62c340d6f738eeb
SHA5127e54bcce8f6813873db102f010431ad1ba83d554e9c368c598d428a1b8e6bc10f3622e559c0daa9d5b1740aa6fc08a5d97bc3f23217035b929a64b0399ce9830