Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
37fc5123b9f839abfe9b8ff5d4c44da4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37fc5123b9f839abfe9b8ff5d4c44da4.exe
Resource
win10v2004-20231215-en
General
-
Target
37fc5123b9f839abfe9b8ff5d4c44da4.exe
-
Size
747KB
-
MD5
37fc5123b9f839abfe9b8ff5d4c44da4
-
SHA1
6e4f86fae06a19a371b852db26c9e98653475b47
-
SHA256
5508e761bd200741db6a0daeec59f51b3138845ab695ea62ce34233e4051558e
-
SHA512
9486c39c0912a6e8cb8dd2f2cebbf1c764b0d5adec895113246976d3e910e5314c558bcaf0c9aadf704b309b0fcf49d0751b0d6904fad3cb0244fed5c987f35d
-
SSDEEP
12288:U0F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:U0EGALzohzUy2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c000000013138-4.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1864 37fc5123b9f839abfe9b8ff5d4c44da4.exe -
resource yara_rule behavioral1/files/0x000c000000013138-4.dat upx behavioral1/memory/1864-6-0x0000000010000000-0x000000001012A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD52aee072d5b4bc8c70fee41f4318e6bac
SHA1fe0d68cf047688ce85fc9bc595fafc3c5948a089
SHA256654d6bc2fe5cabd8f263a230db0788fd72a091e5b5b560df7444fb90e9f6d394
SHA5128c2e179fc2636f446f5b6d07a0780c38db907907585d2082c21a5c142a7aa7ef001eeb075d88d52c65a09a8e170b021d47f5238ee1377329e1d169bbfe0d7041