Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2023, 07:34

General

  • Target

    1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe

  • Size

    1.8MB

  • MD5

    4fb8b62c41d10b44b2da53d6f9cb2ec6

  • SHA1

    db43213f122feb10f0e8bde5016b0e6c8a6bf4bd

  • SHA256

    1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc

  • SHA512

    4ddbcb1414c76657b1fcac868167ca58f1bd5fc2a65a86f8552b7513689b9c6c9791d617a12a0292c12cba292c72cf7bf0f825c6fee91682aeb0c64df98f0e7c

  • SSDEEP

    24576:9+q9tmtTIbsWZbG5JyTEclF3Ie+AfloOELBb22xkd+gMjordTb/kTkn6z1jCvuQ:9+d8b5x9lVT1p2xs/b8Tkn6zRRQ

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe
    "C:\Users\Admin\AppData\Local\Temp\1aaa8c4d0cc4d6cf28ff96480105106454bbfe325bb8e7c7625817d9822401fc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\apmFC37.tmp

    Filesize

    148KB

    MD5

    10a2f663fdc511fd52bfcfd0a8837549

    SHA1

    e3669af6eeb82c20b10245caa4974cb727b52bf0

    SHA256

    bd5f2e4ac7c2bea616fa60a50698b0d6d46a9456c08392a5c62c340d6f738eeb

    SHA512

    7e54bcce8f6813873db102f010431ad1ba83d554e9c368c598d428a1b8e6bc10f3622e559c0daa9d5b1740aa6fc08a5d97bc3f23217035b929a64b0399ce9830

  • memory/364-137-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/364-138-0x0000000010000000-0x0000000010081000-memory.dmp

    Filesize

    516KB

  • memory/364-139-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB