Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 21:13

General

  • Target

    4c780ccdf5b3622e7ff4411b0e307458.exe

  • Size

    285KB

  • MD5

    4c780ccdf5b3622e7ff4411b0e307458

  • SHA1

    61c3b85dcf2dc00f7cad26b76b642b7f72832aba

  • SHA256

    245edd3417cc7877cdf7a34d837aae3b7a9901c97a601d326f1f19966fa636f1

  • SHA512

    4d6242838043a14bab7c0caeb960e3e2b836ce2ffd005dbf26d5458ab4c585eb4d1222e166d4278a5e753717ac4a780a209b69068051cbe82b6e9d5f88841ab5

  • SSDEEP

    6144:YjUlk+A23Mlx22PNg+mTA9hj439SLxPAcC7QK/rW30sB+CHx3QFCAwHpias:YjURclmk9hjIOxPLak0sB+CHxA8AwwX

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c780ccdf5b3622e7ff4411b0e307458.exe
    "C:\Users\Admin\AppData\Local\Temp\4c780ccdf5b3622e7ff4411b0e307458.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\xblFE8.tmp

    Filesize

    68KB

    MD5

    8ad326e88bcf186527b3a0d7cbdd2653

    SHA1

    eb4c1f6008487a8474a1e227495782f9fa310ae8

    SHA256

    9edf3476b23342ed45e7c39caed5c9d9bcd05a70c2fde7970a8c78c73a651cc2

    SHA512

    0e427bcdb19e0a5fbd66dc37044debf21ff4677786c23d877e65aea04f82e74e3f770fd3aa7a65dbd46210ce776b0e83c1915eaec8b47aca77e5bbf5cf129f99

  • memory/2868-6-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2868-5-0x0000000000300000-0x0000000000373000-memory.dmp

    Filesize

    460KB

  • memory/2868-4-0x0000000000300000-0x0000000000373000-memory.dmp

    Filesize

    460KB

  • memory/2868-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB