Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
4c780ccdf5b3622e7ff4411b0e307458.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c780ccdf5b3622e7ff4411b0e307458.exe
Resource
win10v2004-20231222-en
General
-
Target
4c780ccdf5b3622e7ff4411b0e307458.exe
-
Size
285KB
-
MD5
4c780ccdf5b3622e7ff4411b0e307458
-
SHA1
61c3b85dcf2dc00f7cad26b76b642b7f72832aba
-
SHA256
245edd3417cc7877cdf7a34d837aae3b7a9901c97a601d326f1f19966fa636f1
-
SHA512
4d6242838043a14bab7c0caeb960e3e2b836ce2ffd005dbf26d5458ab4c585eb4d1222e166d4278a5e753717ac4a780a209b69068051cbe82b6e9d5f88841ab5
-
SSDEEP
6144:YjUlk+A23Mlx22PNg+mTA9hj439SLxPAcC7QK/rW30sB+CHx3QFCAwHpias:YjURclmk9hjIOxPLak0sB+CHxA8AwwX
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d000000012246-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2868 4c780ccdf5b3622e7ff4411b0e307458.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 4c780ccdf5b3622e7ff4411b0e307458.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD58ad326e88bcf186527b3a0d7cbdd2653
SHA1eb4c1f6008487a8474a1e227495782f9fa310ae8
SHA2569edf3476b23342ed45e7c39caed5c9d9bcd05a70c2fde7970a8c78c73a651cc2
SHA5120e427bcdb19e0a5fbd66dc37044debf21ff4677786c23d877e65aea04f82e74e3f770fd3aa7a65dbd46210ce776b0e83c1915eaec8b47aca77e5bbf5cf129f99