Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
4f53e2708bd8d0daa22d08f8657ab178.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f53e2708bd8d0daa22d08f8657ab178.exe
Resource
win10v2004-20231215-en
General
-
Target
4f53e2708bd8d0daa22d08f8657ab178.exe
-
Size
785KB
-
MD5
4f53e2708bd8d0daa22d08f8657ab178
-
SHA1
4ee9754d1e91eba194d9efa0c588b822e5fbc52a
-
SHA256
6096619c2199781f077243678b8faf351927f2e46a5b525b5cfdcc0db427c876
-
SHA512
2bf222a6fe14e826ed2b91b362755ac7d66d2ad2ee672bcbf469f9684d09f8ca0bcff7f8226dcbb3d55b51369eb6a608a1f23055feab44dd2be37c3398c0a9a8
-
SSDEEP
12288:QTre6sXpVpBoCncf6k88OyMUXWKNUZ/saAitSi8ruH6MLDbEzP0sA0raMe4Sttm:Qf92ocxTdyMZKYE9i98KxLNQre1M
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000013a71-0.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2912 4f53e2708bd8d0daa22d08f8657ab178.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\V22005312.EPE 4f53e2708bd8d0daa22d08f8657ab178.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2912 4f53e2708bd8d0daa22d08f8657ab178.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5f3b32d950d9c84b85d01d536ba3838e4
SHA172f1233a604cc279b6e1df6d3e6d5b41c5a94e27
SHA256624e0ee3234eea3ade48d120bad8cab2f6eed789ba6cf71425749e467f32f98b
SHA51209fc8eadbe384e28ad479d51697236ec478cad7a137e1ab99efb94dcb410dc06ed19ba25a2c01a8ea05cfcc688ff5a51bf087cdf217d7bdc0095433db7f07319