Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 10:17

General

  • Target

    a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe

  • Size

    1.8MB

  • MD5

    b19978bb182230780aa7f59ee5c445dc

  • SHA1

    4961f2dc75a0580273011005981b46b7c572801f

  • SHA256

    a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946

  • SHA512

    2ed4d313af9db563aac08c491fba97cc30138f0f1d717d7dac4dd86f84d882674f2da827d37e051f0ff750ebac7f4da482c653e28fd2adae1841c9412993487e

  • SSDEEP

    24576:F0sBNGJNexu/6dM70bJoacug3o7XqVlFRVFCO+847DrdGiKhT0c7/3PO1GCe/:F0LCR6dd4slFRVEvEnT0A/2Qx/

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe
    "C:\Users\Admin\AppData\Local\Temp\a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\apm906D.tmp

          Filesize

          146KB

          MD5

          3d4839228c7ee77e28832879eeb17340

          SHA1

          ebe4a6388c8c6831837e232b48b8f4266b7f711e

          SHA256

          5d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954

          SHA512

          f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56

        • memory/1932-0-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1932-4-0x0000000010000000-0x000000001007E000-memory.dmp

          Filesize

          504KB

        • memory/1932-5-0x0000000000400000-0x0000000000606000-memory.dmp

          Filesize

          2.0MB

        • memory/1932-6-0x0000000010000000-0x000000001007E000-memory.dmp

          Filesize

          504KB

        • memory/1932-9-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB