Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
108c0d520d6c8112acb5994f275e29b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
108c0d520d6c8112acb5994f275e29b7.exe
Resource
win10v2004-20231222-en
General
-
Target
108c0d520d6c8112acb5994f275e29b7.exe
-
Size
216KB
-
MD5
108c0d520d6c8112acb5994f275e29b7
-
SHA1
f6fef13c3a2ab54888839a5644038eb54eff5087
-
SHA256
168a2f285947d3c653a29ac89907f7b5aa4658bb72bdc0db5d72a4bf8368a119
-
SHA512
78ecb4b3ae452136b1a23698899868356bcb6124281df09f55380dc0b8647c3be605e842b27250fa7b32688a3cdc89f30affd985f14b7ca19a2d17e784fcb3e0
-
SSDEEP
6144:ILFWzBHT23oxyLSP8HZoWlzNL5Nzs7dnNmToQivTxXD7dWso:+wzNT2LG0H+Wd3O7dnNmT03dfo
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000014439-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2296 108c0d520d6c8112acb5994f275e29b7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 108c0d520d6c8112acb5994f275e29b7.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD532d39689baa24e0a1300260d8357eede
SHA11b4a8d1ad432df5c9fb0d05ebf3bd2caa8fa2962
SHA2569d158434f454af30aac90846fa41c328b66e60111aaa2f91b83c002e5d7407dc
SHA51281b820f9e938ef12eee9472c26afee5c663a97acca467a5eacae684f1be451eb01e3faf5952ca90a1f31375c25fd9d5cecc5d98f3cbcf1ccbe08ebb82a5ad368