Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c6f342f14b72aea5d57e733a6ac4177.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c6f342f14b72aea5d57e733a6ac4177.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
4c6f342f14b72aea5d57e733a6ac4177.exe
-
Size
261KB
-
MD5
4c6f342f14b72aea5d57e733a6ac4177
-
SHA1
d8db5481b0dd14a276d71c4c0f8f3b1ca115b0ed
-
SHA256
21ab711b76e9fa9dc47d543235824af53018a2fa9b022dc5a1779e86463074ef
-
SHA512
05e45310b764b074262084874056f9101b40f7bdd7211e9b5bbc3c1716f1e5831bea0d1dd5ee3773ab381749cf4e9c489d9a798df8f8e385e5b626da33e07984
-
SSDEEP
6144:mnxIZhKp10FptMozwcxGPIoRnbqSCBoYemE1WMb4:mxIZhKp1Ap+0wcxGP5nbdm+4
Score
7/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000126ab-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2196 4c6f342f14b72aea5d57e733a6ac4177.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2196 4c6f342f14b72aea5d57e733a6ac4177.exe