Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
1348dc78dfe608052c3ba9439998be7d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1348dc78dfe608052c3ba9439998be7d.exe
Resource
win10v2004-20231215-en
General
-
Target
1348dc78dfe608052c3ba9439998be7d.exe
-
Size
245KB
-
MD5
1348dc78dfe608052c3ba9439998be7d
-
SHA1
98cacaeeb04d5983b40cc8c889667c2b0f062619
-
SHA256
2fe6087b32fa0bd0935e25dfe3d9d416cd1c5df6e1131b2f3760e66095352a34
-
SHA512
cef70c7eeed3570d1455545077e90697c1cf470accb7587ea13f4b125ec8424b3ede9d9ec924b5f3dd12590b7ae2be22f67c118a80d30cef6b81df744757be26
-
SSDEEP
3072:UgMWphvWcSMH9f4jIL7CdoIEjvczyUuW95carPGoByEMPZlrmKKz/sBbQ:OWphnf4j27woIEDpUuGbrPf+SX
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000200000001fafe-4.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 1416 1348dc78dfe608052c3ba9439998be7d.exe 1416 1348dc78dfe608052c3ba9439998be7d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1416 1348dc78dfe608052c3ba9439998be7d.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d960d62ddfc2c854a699cd36df2de5ff
SHA1be41a13171e47bb8d03279c63947a6fb101f4162
SHA2567352f8f32f802591d6562c09f90437fb0481309d5f9c65f439e874c68ea7e0d5
SHA512c07379e87f7c46ea397f70e6aa98da2e8cd24113298b9828d8809249827fdbd96a73b9069d820779c74d8412497088d1ec5a562288098a184517046f13572981