Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe
Resource
win10v2004-20240611-en
General
-
Target
740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe
-
Size
5.3MB
-
MD5
b2da2e450c4b1cb60a0600f8523d74ed
-
SHA1
6bd27706fa094a776e3ba470137c74b630aa7012
-
SHA256
740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9
-
SHA512
468b607a0ce5bb466eadbc04764cf971493d959f4b18edaaea0ff3b7aa8bc80626a9eeecd8e6e5789b6277eb3a9d833a73bad87fe18c5c98804e8f7b40a94e48
-
SSDEEP
98304:Mcbiqj1Qg7YqdwkLcHHwVzArOSqeDalc6d8:MQj15jACc9BDalk
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00040000000168a5-7.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe -
resource yara_rule behavioral2/files/0x00040000000168a5-7.dat upx behavioral2/memory/860-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/860-13-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe 860 740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe"C:\Users\Admin\AppData\Local\Temp\740ebf947b88982af4e228892ce170c97134bea0e4f58ceeb0d0b0b158b164f9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4532,i,2029050989380753659,15333598055019363793,262144 --variations-seed-version --mojo-platform-channel-handle=4140 /prefetch:81⤵PID:3096
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
95B
MD5012f5ccffe3ec0b778d4737d10784008
SHA1028747b05aa431ff7fb8713a47989bb03174a909
SHA256b2f4c09a57f6bf49664fe6aa6bc2fe3b1dacdc5f1fc3e7f22a9d8587beeb248a
SHA512cfaf519cfd3eeb5b692016f15122b1a7f95a7f8db4b2735a3979e092db359815be979b661e1290bac361885ae418c58661fe14f0e5ec687f6e765a354d49de58