Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
1057f18f2c73b64d0f2ad8d11ef0faed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1057f18f2c73b64d0f2ad8d11ef0faed.exe
Resource
win10v2004-20231222-en
General
-
Target
1057f18f2c73b64d0f2ad8d11ef0faed.exe
-
Size
295KB
-
MD5
1057f18f2c73b64d0f2ad8d11ef0faed
-
SHA1
748e4fcc3764417e4555807139311e4b51f533a3
-
SHA256
62eb43d6ec0bdc48a92fcd121cb0366b2640df0d44bea58d1dae397115df3ccb
-
SHA512
1e7b5a12c00d0611070f66631395cb0314aed0eb003800ba9011339b81aa6e48296b9239d18483bf8e936511e99a1640c84d33e110e3074e20dc9d9233640311
-
SSDEEP
3072:qxFM5spM4P/NEkxhJsF6g1q5+GFiNk5F29wpHuTvnX1lBQ6LO2XoTWCjpDLQyob7:bAJmYYUFF2kaMHujX1UV5Qvn3OUuXp2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000016441-3.dat acprotect behavioral1/memory/1744-53-0x0000000074C80000-0x0000000074C89000-memory.dmp acprotect behavioral1/files/0x0006000000016d33-51.dat acprotect -
Loads dropped DLL 10 IoCs
pid Process 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe -
resource yara_rule behavioral1/files/0x0007000000016441-3.dat upx behavioral1/memory/1744-8-0x0000000075400000-0x000000007540A000-memory.dmp upx behavioral1/memory/1744-53-0x0000000074C80000-0x0000000074C89000-memory.dmp upx behavioral1/files/0x0006000000016d33-51.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 1057f18f2c73b64d0f2ad8d11ef0faed.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD528d6814f309ea289f847c69cf91194c6
SHA10f4e929dd5bb2564f7ab9c76338e04e292a42ace
SHA2568337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
SHA5121d68b92e8d822fe82dc7563edd7b37f3418a02a89f1a9f0454cca664c2fc2565235e0d85540ff9be0b20175be3f5b7b4eae1175067465d5cca13486aab4c582c
-
Filesize
13KB
MD5431e5b960aa15af5d153bae6ba6b7e87
SHA1e090c90be02e0bafe5f3d884c0525d8f87b3db40
SHA256a6d956f28c32e8aa2ab2df13ef52637e23113fab41225031e7a3d47390a6cf13
SHA512f1526c7e4d0fce8ab378e43e89aafb1d7e9d57ef5324501e804091e99331dd2544912181d6d4a07d30416fe17c892867c593aee623834935e11c7bb385c6a0a8
-
Filesize
25KB
MD529e2dcdfb57ee3ab5e2bbc2fc3c42f02
SHA1bd6cafcce5b70ee15311f9f53e9fd4aac819ccda
SHA2562b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f
SHA512f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a
-
Filesize
10KB
MD5aae2d975a13296f427f75ce657960cb1
SHA1db38c431929e30acbc360c00dbe44e5ec67b7a68
SHA25698a182434351fdbf79269df78a472aa6b0439aeb5d4c110fecd01b5a2105f5c9
SHA5121bba467598436ef4600c9428b4c722cc2d34dfe9742b5cb8c88304e03f7fcafc147a42f99db787ae7b7ba504bba18d9748ad75a85d553f137cd459df9f0a49c2
-
Filesize
11KB
MD566cfc94903c8cfa492fdab42bde2026d
SHA1d07194419d914eae5dc54a480ebddb0a8cb32f25
SHA25682e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632
SHA512ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90
-
Filesize
5KB
MD502f1858b3131ffc3fc5e3a5391d3a489
SHA1454a6d749cf55ff990bd9f57941aca9d1f1674f6
SHA256f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12
SHA5128147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b