Analysis
-
max time kernel
142s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
415392835ede91967a7cc1fd0ca909b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
415392835ede91967a7cc1fd0ca909b0.exe
Resource
win10v2004-20231215-en
General
-
Target
415392835ede91967a7cc1fd0ca909b0.exe
-
Size
172KB
-
MD5
415392835ede91967a7cc1fd0ca909b0
-
SHA1
8d029b33e6dcb4270ccd8421bb428f5e35beacdc
-
SHA256
dce73734f91d555c1079ba34883c5d1257919d30f132cc1f1aeedd4873a89a47
-
SHA512
2d50618172f10c6c9194984085b1c754c645d75e78245cc16372cb4c3c490c6cd8e1f01b397306d553ace7c7b78b0573fc11e46e029afe5f91fa88574efe1f9d
-
SSDEEP
3072:Fiplr/0QnyneVB7c6PUQU/3pKAgtLG2/zfY0zfaJB:0plrc+ynejQ6PUQU/3pKpB/zfVsB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000014fed-4.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2540 415392835ede91967a7cc1fd0ca909b0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 415392835ede91967a7cc1fd0ca909b0.exe 2540 415392835ede91967a7cc1fd0ca909b0.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD52187d6e3fd72cb3e19cbc4d8fd4636eb
SHA1c6e047a93d752b4efb70a55576e6e9a58cd9ff5d
SHA25646db8fd1715e0ef3f6e6123ad2c5f4d1c433c0e19a3a58f7c5eec60e4a9c1b9d
SHA512aa46b1f0fafad0f2efaa3ade0db21e57163b977c1e92f8b8983491813c796f76e8cbd1928843e45d16315c45d7a9512065c9871db9bf89a0985b33a22abe571a