Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
07e4d1190683bc1efe6923c2c690fac1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07e4d1190683bc1efe6923c2c690fac1.exe
Resource
win10v2004-20231215-en
General
-
Target
07e4d1190683bc1efe6923c2c690fac1.exe
-
Size
314KB
-
MD5
07e4d1190683bc1efe6923c2c690fac1
-
SHA1
9aaba5debbf5cb8eccca077e48a864218c938c28
-
SHA256
05da1d7001827441432f16a6a0524738855bedfebc0a332a60b5331b8b290569
-
SHA512
b7e7ec4e29dfae2e160ce694288abc55aee110ecee7dee762c8ba524964b974a1894cf51d7d78da8525c19957914cde4c48be06b4b760f317a562fc6d9ab4e42
-
SSDEEP
6144:RALbQe0W/PIIOxAFlw1tO/bmJpKgsn7rdSp3:4bhFWQipgnVC3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000015df1-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2548 07e4d1190683bc1efe6923c2c690fac1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 07e4d1190683bc1efe6923c2c690fac1.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD558504e17f270707f5fe9f92a9e292b54
SHA124ecdf523f77cc49b99644dd2341fd3fbc4d5911
SHA2562539aa38879e7571b7656abd1f8e2f816b110428317ec24c8dc90a2967120132
SHA5125d6c632b9f141f1adfbf20d45366ee7e7857d2169a9bee6ebd1c5ddd5e3d2c1f3343f99d17a0e93315c128f80050d76a75e4e53d4cc33526f97f0c7fe4349b64