Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:27

General

  • Target

    37fc5123b9f839abfe9b8ff5d4c44da4.exe

  • Size

    747KB

  • MD5

    37fc5123b9f839abfe9b8ff5d4c44da4

  • SHA1

    6e4f86fae06a19a371b852db26c9e98653475b47

  • SHA256

    5508e761bd200741db6a0daeec59f51b3138845ab695ea62ce34233e4051558e

  • SHA512

    9486c39c0912a6e8cb8dd2f2cebbf1c764b0d5adec895113246976d3e910e5314c558bcaf0c9aadf704b309b0fcf49d0751b0d6904fad3cb0244fed5c987f35d

  • SSDEEP

    12288:U0F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:U0EGALzohzUy2NJvhjyR4kKJRi0+4

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\37fc5123b9f839abfe9b8ff5d4c44da4.exe
    "C:\Users\Admin\AppData\Local\Temp\37fc5123b9f839abfe9b8ff5d4c44da4.exe"
    1⤵
    • Loads dropped DLL
    PID:1864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    210KB

    MD5

    2aee072d5b4bc8c70fee41f4318e6bac

    SHA1

    fe0d68cf047688ce85fc9bc595fafc3c5948a089

    SHA256

    654d6bc2fe5cabd8f263a230db0788fd72a091e5b5b560df7444fb90e9f6d394

    SHA512

    8c2e179fc2636f446f5b6d07a0780c38db907907585d2082c21a5c142a7aa7ef001eeb075d88d52c65a09a8e170b021d47f5238ee1377329e1d169bbfe0d7041

  • memory/1864-0-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1864-6-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/1864-7-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB