Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
42babb503fe9a0d4319ed049037da975.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42babb503fe9a0d4319ed049037da975.exe
Resource
win10v2004-20231222-en
General
-
Target
42babb503fe9a0d4319ed049037da975.exe
-
Size
23KB
-
MD5
42babb503fe9a0d4319ed049037da975
-
SHA1
23a89d3169e64778acecfac2099342b8b09064e6
-
SHA256
3a87cc26a70ae4082b039af9e93c208e9cf1a48f3a73557651ceb1ea274c65aa
-
SHA512
7fe6fcbee6744eff0f7185b6c3cca6a1b740e809ee596ac3c044343193b6f435b3b8219818c58cedac4149f870a0b90c8ef1ed931140a44808c3a9a50e11cd4d
-
SSDEEP
384:76LRfL+7XY4qagthLw+fCcH32xSuT+GoGsLV/QNl2Dcq5RAVlbVi35uxVaPgQ91P:2tq7o4qagtt1Ce+zGtgl2jiVxxfaPhb
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d00000001224c-3.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2108 42babb503fe9a0d4319ed049037da975.exe -
resource yara_rule behavioral1/memory/2108-6-0x0000000001B60000-0x0000000001B73000-memory.dmp upx behavioral1/files/0x000d00000001224c-3.dat upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2108 42babb503fe9a0d4319ed049037da975.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5ebbbf166fc5353c6f188c2bc1087262d
SHA1f6d256b0eaba94bbb7a45086f79570737e18b56b
SHA2565fc419332337bb4f1d655fb69f38841769503a8b62a87ae0eeb24d1e2b0b3bb3
SHA51229a7e5c53de0b678f7e6cef16b0ad959d613026e048b417e02020029e8779b56f1c949a2f62a88087f5993ae983967258e2fbe492f13e8239317e9caa95fafbc