Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe
Resource
win10v2004-20240412-en
General
-
Target
a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe
-
Size
1.8MB
-
MD5
b19978bb182230780aa7f59ee5c445dc
-
SHA1
4961f2dc75a0580273011005981b46b7c572801f
-
SHA256
a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946
-
SHA512
2ed4d313af9db563aac08c491fba97cc30138f0f1d717d7dac4dd86f84d882674f2da827d37e051f0ff750ebac7f4da482c653e28fd2adae1841c9412993487e
-
SSDEEP
24576:F0sBNGJNexu/6dM70bJoacug3o7XqVlFRVFCO+847DrdGiKhT0c7/3PO1GCe/:F0LCR6dd4slFRVEvEnT0A/2Qx/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023448-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 4892 a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe -
resource yara_rule behavioral2/files/0x0007000000023448-2.dat upx behavioral2/memory/4892-5-0x0000000010000000-0x000000001007E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4892 a9103d5228dffd8f630c0bb96d496c99a178532dadf5cc3c9e8b6338a76c5946.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD53d4839228c7ee77e28832879eeb17340
SHA1ebe4a6388c8c6831837e232b48b8f4266b7f711e
SHA2565d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954
SHA512f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56