Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:42

General

  • Target

    AcrylicUI.exe

  • Size

    572KB

  • MD5

    9f82dc46fad4bf327e63fe92cbb9702c

  • SHA1

    cbe517a40db31b48a988d7791454a53b19e41436

  • SHA256

    68183b903249c26d90d214fa1b60d53f5d100af8f87da5847769230bca189693

  • SHA512

    f704757c32b5608c679b5948c9ba5176442c353ab217ffac67c9004cff6f220367096fabca75b04ed5948572cb94dffa23d12d2acff459d6f0177502e8d2b7fe

  • SSDEEP

    12288:N+yaodvZrLi3YH0ASp1gzb2T/aheTLEw5OFHnGtKX2:N+5orBwp2b0yhe/h5ZtKX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AcrylicUI.exe
    "C:\Users\Admin\AppData\Local\Temp\AcrylicUI.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1112-0-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB

  • memory/1112-1-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1112-3-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB