Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:50

General

  • Target

    04d8a0c697b650c5bc99726b1acc9914.exe

  • Size

    39KB

  • MD5

    04d8a0c697b650c5bc99726b1acc9914

  • SHA1

    a1f622b674a7308b06620c39ad3193a2fe9d83db

  • SHA256

    f758ffc7c54b7519ea2db0a25f835f46d74bba8f9cba0ee1e35eeff416e9e9c7

  • SHA512

    56a6d9434c81565fdfd5df8d6daef9421d9ef8c8aac067ba55c9fa1e959ed88fdf4b8d922bd1232e504cb10b83b3aa571b1a0cfb3fe97512654936630db15bdb

  • SSDEEP

    768:+jSALy/Z2Yj+jE+qwcSl4Sc+t3luaCdRmEVPJG81D4SvVct3e9:6LQUYajE+bcAhllTCSE7Fh4Svit3e9

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d8a0c697b650c5bc99726b1acc9914.exe
    "C:\Users\Admin\AppData\Local\Temp\04d8a0c697b650c5bc99726b1acc9914.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:1712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\Common Files\Microsoft Shared\MSInfo\hackol.lmz

          Filesize

          22KB

          MD5

          d40d7ce7419f29a16be3c2061782fff5

          SHA1

          db2678dd0adc103619591026df66c46fe09ebde1

          SHA256

          e478a7cd47eb5429f90c0fa11304f379544c0863d76e3639ff25bbda855c0ed1

          SHA512

          2e45e8935a763fa6884f05a83f90b3828095c591905f2893864d4823f2395e3b3b01e228f1543aaafcd606002bd9d744452bcd6f15316cbcb49ba41db569f6e2

        • memory/1712-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1712-5-0x00000000001B0000-0x00000000001C2000-memory.dmp

          Filesize

          72KB

        • memory/1712-7-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1712-9-0x00000000001B0000-0x00000000001C2000-memory.dmp

          Filesize

          72KB