Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 17:39

General

  • Target

    31948a79f177d21529b624619b6b04ff.exe

  • Size

    329KB

  • MD5

    31948a79f177d21529b624619b6b04ff

  • SHA1

    7423ada060a696bff47b6eb785c33a74a47a6329

  • SHA256

    05e9b7df8a0e86889ec2959cb63d8f9516f3e978b343af10a80a505aa3ed1c7f

  • SHA512

    744df3327c1413441251e1bedee0bc55bc1059ea4516e8102158c2076abd05aa9b496893e5bf688b0a93c0cfde4aa4b53402906e30a01c745b780ca372f560fd

  • SSDEEP

    6144:XQ5+K2LHG8595Alab4IcbFJibvIiB1Ht+IlP8sDelIft3N171GXbOrBq:GPijIq1nbelU76aq

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31948a79f177d21529b624619b6b04ff.exe
    "C:\Users\Admin\AppData\Local\Temp\31948a79f177d21529b624619b6b04ff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\mgl3F80.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/1320-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1320-4-0x0000000000320000-0x0000000000393000-memory.dmp

    Filesize

    460KB

  • memory/1320-5-0x0000000000320000-0x0000000000393000-memory.dmp

    Filesize

    460KB

  • memory/1320-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB