Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 02:30
Behavioral task
behavioral1
Sample
000049b565a9253ec779203cfade2555.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
000049b565a9253ec779203cfade2555.exe
Resource
win10v2004-20231222-en
General
-
Target
000049b565a9253ec779203cfade2555.exe
-
Size
1.9MB
-
MD5
000049b565a9253ec779203cfade2555
-
SHA1
866a6b85b44589f5e91e715d1fb461dcce8df53a
-
SHA256
7cbb42f7ad746f99f287c5fa37af3523ffba3761edb8b052268fa6b708c11a19
-
SHA512
f7a0735545fcfbbe385b9272f24d93b21341fcbd9bc378cee6ff95ba92b88af03690a1708930dbc35e1a7a4ae58df387370b1571f887fc9787b84cb1c4e19cc9
-
SSDEEP
49152:sqfhfFU9oHcRm1donhMUQUiidPpfbVNdNE8JL:VfhfOXR5uG5pfHdNE
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b00000001508a-6.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1300 000049b565a9253ec779203cfade2555.exe -
resource yara_rule behavioral1/memory/1300-0-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral1/memory/1300-8-0x0000000074F10000-0x0000000074F46000-memory.dmp upx behavioral1/files/0x000b00000001508a-6.dat upx -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 000049b565a9253ec779203cfade2555.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1300 000049b565a9253ec779203cfade2555.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD52854bb1492903f284ccca9f5f92d9551
SHA1fbdea0337cc0b1bf6e341ccc5209f9e97e1cd930
SHA2566ec6d109fd7facc8d3c2c45811978390dfc7bf0748f6560d9476611c7a9e3f99
SHA512f3d153479e18d828c9ca84b3ed2342066bd5b4b52b852c6dca70b2f88f038038af0d1808211b5dc5a4732ff5bf6de8dbdd48b2cdbbb03ca99b167076b292d7bd