Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:25
Behavioral task
behavioral1
Sample
10c60b42707b709192b10d963a19c6a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10c60b42707b709192b10d963a19c6a1.exe
Resource
win10v2004-20231215-en
General
-
Target
10c60b42707b709192b10d963a19c6a1.exe
-
Size
5.2MB
-
MD5
10c60b42707b709192b10d963a19c6a1
-
SHA1
5348a2fc4d5292942f4676d0e983579f5b1c71e9
-
SHA256
53b53d2f32ab95be7a05c767471024cddc994dcd544c660fbac8063504841d4e
-
SHA512
9c40f0ad44553e7e5f8708913a5b7c5f5c130687f4985a928f5e33c8255504f4fb0694e98631fb793e477b5d80071c9e7986b0bfa0a823647c3a4508b4e375a8
-
SSDEEP
98304:PuF6ijSedheAclznDx0NkdsXNB12L79wp9npmMiK0L9jOlWXQTdFK:P1ixdijDc8sbq6vmamwLO
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023143-12.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 4736 10c60b42707b709192b10d963a19c6a1.exe 4736 10c60b42707b709192b10d963a19c6a1.exe -
resource yara_rule behavioral2/memory/4736-0-0x0000000000400000-0x0000000000569000-memory.dmp upx behavioral2/memory/4736-57-0x0000000005260000-0x00000000052BB000-memory.dmp upx behavioral2/files/0x0008000000023143-12.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4736 10c60b42707b709192b10d963a19c6a1.exe 4736 10c60b42707b709192b10d963a19c6a1.exe 4736 10c60b42707b709192b10d963a19c6a1.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c9f333d1ff898672a34805f94a265329
SHA12deaac66698fb2e9b3868d23034c3211c508b739
SHA25607e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b
SHA512048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add
-
Filesize
1KB
MD55b988eba5206504a7a9ef9567a71d576
SHA1016139e5b3e8dbe79c0d8df6c94329f1f51dd8b8
SHA2567eb7963147385f4dc813c02fc0109e9fc5525b4021eb6cf2f1402bdf4c0f4b31
SHA5128154a5101f4360686c405a636037c724b55affcc31e3ff6f3a78c24e77c2816732ef1732c565cf34a41fa78523a4c3738d06c11e3454b21986126630f5c9dd47
-
Filesize
1KB
MD50a67859cdbbd7dd49cd5cfff049403e0
SHA1adace2f52d9aa1de1ffcc115639b7ab6bc35e4bc
SHA2562e57a485465414f6ba3efd0d61c23a73adef495984e4a8a8dc38785f800efab7
SHA51273bc711fa0cc7bbd3d17ccf2dcd2eb16b46ca75b793e268028638660ad89dfddcc5d628a426c0e1fe1d66ade5f86ce95f3cbebb111a8e7448af77025c042d7d5
-
Filesize
102B
MD5fd7b0ad90e04f867f0caf572d03b6d1c
SHA1f54f16fcb066d29d280276dd280b7ee7c83a1573
SHA256c9c9589c41594137ef6f54b394d3495910601e8f0d77f4ba0866b513e84a24e6
SHA5120215bd6562e26025c3dd0e6d9696a930368a146bd6d9eab8b0b30149ceeb03a8d0f7b8511203f27e3adcfc5affb9ef7ca040659eb670fead4289c233910f553c
-
Filesize
632B
MD5f3ca8504fe38798d402ada65acc0923e
SHA18f9930721e2a559be8e4379cb6e9dc9ffd71ef52
SHA256f4b4d8d4bb78d970a3fcf6dc8ee0353776801ef373b54d839cd8853c1481a378
SHA512ab1324ec6f5dcd034efadb6eef3224244de5eb328a4c28e4646a7a182d6af2ec60dad50f52b1e8aedbe18e3eb6a03a4705949763746952492e9abb0f9e01bec7
-
Filesize
959B
MD5997b4c4553a419650ec27b7f53cd94ef
SHA113a577fe4669412ef3d54bd761ff7878876079c1
SHA256a044dffe80c9ce80d2364681836b7835fdc1c49f30ba83192231e5089973c9a4
SHA5125f423448c03f1f79b4cc326125e27e60a57bf54c9c834c6be6b848712a814c71376a2def86bb5bbe20c4856798ee88560222f9ff60a9e81a5ece1110d7ef76c7