Analysis
-
max time kernel
160s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
52b82754d055959c227ce34702731e70.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52b82754d055959c227ce34702731e70.exe
Resource
win10v2004-20231215-en
General
-
Target
52b82754d055959c227ce34702731e70.exe
-
Size
163KB
-
MD5
52b82754d055959c227ce34702731e70
-
SHA1
ce264c902d5500be5bbd4d433e6a79b2947fa97f
-
SHA256
e8d29dcc6b1109fbc27b57a6887ec720ad07772d584c5fb0a2d47237b0c080df
-
SHA512
20fbfcece5035cfc7c84dfdcbc35310cae0c41f077b1dae79dd131c9af42974c6e02c3d7795df7824cd9f0df2bef2141635575f6961a1900b66b7991b7e9fe74
-
SSDEEP
3072:04L8emcQHPkzgrVtiblnj+Kiznnwx4vHXvFWD0bI4s2RvfY4T:04L8emsKCB4nwYw5v
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000400000001e7e2-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 3124 52b82754d055959c227ce34702731e70.exe -
resource yara_rule behavioral2/files/0x000400000001e7e2-2.dat upx behavioral2/memory/3124-6-0x0000000075790000-0x00000000757B2000-memory.dmp upx behavioral2/memory/3124-7-0x0000000075790000-0x00000000757B2000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\yitdpit 52b82754d055959c227ce34702731e70.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5319ec58928f82afaa5fa04d03197089e
SHA180c881160580d26819aedd468c84f9354607e397
SHA256fdebfa949f9e97a9be26063560bd666183b1ec0f7149cff5ef92eb1f1794d52c
SHA5126557be47c482079863063a5d343a9db73cf48d84ca1b946a5fae5c07353f84a634dcd14be8ca3254c4b478c793cc8f085ac8c97aefbc2ef1d48814bda1842415