Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
0608e031a944b2b51f3c0613c63c2327.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0608e031a944b2b51f3c0613c63c2327.exe
Resource
win10v2004-20231215-en
General
-
Target
0608e031a944b2b51f3c0613c63c2327.exe
-
Size
317KB
-
MD5
0608e031a944b2b51f3c0613c63c2327
-
SHA1
3545b3ec4dbca754f8f8fe19e9e800d5615e0c41
-
SHA256
5b02a29c474e7876157077e8b5f1c4de64a25e550cd4dc56a46bfdb5d681f11f
-
SHA512
d0eb92de1516d533c38ea02041bf92dd647e3c18e9b63492116db1447cf533adc7a4ce7e6de69b6516ef07973131feeded5ae64046dd3eae5ef2e4c109577bbb
-
SSDEEP
6144:/Lj4/x4LvpB7u06wl+YoYFJAfwrEyZY6TF4yo:/LM/kyOYYoA8Xi8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d00000001224d-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1712 0608e031a944b2b51f3c0613c63c2327.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 0608e031a944b2b51f3c0613c63c2327.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d960d62ddfc2c854a699cd36df2de5ff
SHA1be41a13171e47bb8d03279c63947a6fb101f4162
SHA2567352f8f32f802591d6562c09f90437fb0481309d5f9c65f439e874c68ea7e0d5
SHA512c07379e87f7c46ea397f70e6aa98da2e8cd24113298b9828d8809249827fdbd96a73b9069d820779c74d8412497088d1ec5a562288098a184517046f13572981