Analysis

  • max time kernel
    167s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 18:56

General

  • Target

    010d27c11985c7a5cb87c75a82f06987.exe

  • Size

    525KB

  • MD5

    010d27c11985c7a5cb87c75a82f06987

  • SHA1

    1d06a2c3f54825064c581394aaae8393df42d5f1

  • SHA256

    21cf17992dfa733a5fdfc94a782185f036620467926b66e635efcb7bbea8ccd0

  • SHA512

    02b05ab1262c8f9f0ce5f64afddf09e88bfe5deaf19f6355b4ea4d856367f4ccf848746fe44941e9cbe8d361ef820e748bfec1c5c432a0cb7db37467a136f389

  • SSDEEP

    6144:/VKKdL+a2KNoq5uIK3zVtPb1LDNKvufzgKkNtLV9xy0d9WIkkYPLQMY/o+h/Ba4Q:/VKKRgIsPpLDNR2tLV9xJd9WITevY/Du

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\010d27c11985c7a5cb87c75a82f06987.exe
    "C:\Users\Admin\AppData\Local\Temp\010d27c11985c7a5cb87c75a82f06987.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\duiD021.tmp

    Filesize

    172KB

    MD5

    fe763c2d71419352141c77c310e600d2

    SHA1

    6bb51ebcbde9fe5556a74319b49bea37d5542d5e

    SHA256

    7fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b

    SHA512

    147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c

  • memory/3960-0-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3960-7-0x0000000002250000-0x00000000022C3000-memory.dmp

    Filesize

    460KB

  • memory/3960-8-0x0000000002250000-0x00000000022C3000-memory.dmp

    Filesize

    460KB

  • memory/3960-9-0x0000000002250000-0x00000000022C3000-memory.dmp

    Filesize

    460KB

  • memory/3960-10-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB