Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:50
Behavioral task
behavioral1
Sample
04d8a0c697b650c5bc99726b1acc9914.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04d8a0c697b650c5bc99726b1acc9914.exe
Resource
win10v2004-20231222-en
General
-
Target
04d8a0c697b650c5bc99726b1acc9914.exe
-
Size
39KB
-
MD5
04d8a0c697b650c5bc99726b1acc9914
-
SHA1
a1f622b674a7308b06620c39ad3193a2fe9d83db
-
SHA256
f758ffc7c54b7519ea2db0a25f835f46d74bba8f9cba0ee1e35eeff416e9e9c7
-
SHA512
56a6d9434c81565fdfd5df8d6daef9421d9ef8c8aac067ba55c9fa1e959ed88fdf4b8d922bd1232e504cb10b83b3aa571b1a0cfb3fe97512654936630db15bdb
-
SSDEEP
768:+jSALy/Z2Yj+jE+qwcSl4Sc+t3luaCdRmEVPJG81D4SvVct3e9:6LQUYajE+bcAhllTCSE7Fh4Svit3e9
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00090000000141e6-3.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1712 04d8a0c697b650c5bc99726b1acc9914.exe -
resource yara_rule behavioral1/memory/1712-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/files/0x00090000000141e6-3.dat upx behavioral1/memory/1712-5-0x00000000001B0000-0x00000000001C2000-memory.dmp upx behavioral1/memory/1712-7-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1712-9-0x00000000001B0000-0x00000000001C2000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\hackol 04d8a0c697b650c5bc99726b1acc9914.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\hackol.lmz 04d8a0c697b650c5bc99726b1acc9914.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\hackol.lmz 04d8a0c697b650c5bc99726b1acc9914.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\hackol 04d8a0c697b650c5bc99726b1acc9914.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 04d8a0c697b650c5bc99726b1acc9914.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5d40d7ce7419f29a16be3c2061782fff5
SHA1db2678dd0adc103619591026df66c46fe09ebde1
SHA256e478a7cd47eb5429f90c0fa11304f379544c0863d76e3639ff25bbda855c0ed1
SHA5122e45e8935a763fa6884f05a83f90b3828095c591905f2893864d4823f2395e3b3b01e228f1543aaafcd606002bd9d744452bcd6f15316cbcb49ba41db569f6e2