Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 17:12
Behavioral task
behavioral1
Sample
c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe
Resource
win10v2004-20240611-en
General
-
Target
c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe
-
Size
3.3MB
-
MD5
a6eb4fdd1f3e1506cb88d9c4e92f1120
-
SHA1
4f8c8637223243d617186c5bb648009461f092ee
-
SHA256
c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8
-
SHA512
471c098e0e45fe0768f68a08da41c43186869f68b11760210f7616de1b0e526bae0f3342483627243b949dd6e7214256716f022cbaf48f1f31f54a5864431bb7
-
SSDEEP
98304:ubCm/GuMIRt+BLlHthTTHyECjoKL5eUTbNl:ubCQM2MLRtIJv1eMj
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002346f-2.dat acprotect behavioral2/files/0x0007000000023473-13.dat acprotect -
Loads dropped DLL 3 IoCs
pid Process 2848 c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe 2848 c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe 2848 c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe -
resource yara_rule behavioral2/memory/2848-0-0x0000000000400000-0x0000000000937000-memory.dmp upx behavioral2/files/0x000700000002346f-2.dat upx behavioral2/memory/2848-5-0x0000000010000000-0x00000000106FF000-memory.dmp upx behavioral2/files/0x0007000000023473-13.dat upx behavioral2/memory/2848-19-0x0000000074620000-0x0000000074676000-memory.dmp upx behavioral2/memory/2848-32-0x0000000000400000-0x0000000000937000-memory.dmp upx behavioral2/memory/2848-34-0x0000000074620000-0x0000000074676000-memory.dmp upx behavioral2/memory/2848-33-0x0000000010000000-0x00000000106FF000-memory.dmp upx behavioral2/memory/2848-73-0x0000000074620000-0x0000000074676000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe 2848 c16b9278b929051b129a1d9f8e3b4a6922a1da94c35e9eb9a3b411a97278aba8.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD52244857ed4d33e3ab8b32c1a09eaff39
SHA19af9d5bc1be9c202471075b5222500c409428fd0
SHA256e345f88529b2337bb2719550985a049c61a6bca84c113c7b07f7ec5313446f7d
SHA512c88af689b603c22dac0be5cdb0922d0bb58325ee57d736b6fa090e967704edb5fa535100149fd5d02ac764ab32b0ccea99310dd28101ffc907a58414e8867590
-
Filesize
2.5MB
MD56d04c6040ebbe9d7f8553be72701b234
SHA1a3d1ef43ce24cea6c825d7f3a73e03688a65c621
SHA256f8504e0076660bbc5efde8e0acfa4f98fedff86d06b04082464d147cc0dc0683
SHA512402f4484ebf93afa7a0c85a52b81e502a4582a51f0c3b7c50e0064907b2d8ce9f52755c05200c8e85fe47241835fc795e7a5e7f0bb9e10d2f17666a87f765363
-
Filesize
162KB
MD5a84e2a5cf1ff392a922a2d36d5ac6d10
SHA16a337a928408faa8528845af3e3c6aedc7c7eaa2
SHA256a0679211a81bd6ccbe9fd8f6a7eb19bd5ea38cc7f3c8452448bc24daf226817d
SHA512c64edde97e4bfad2a6d540673360856a76b7bed7a58c6deefdc057684a51e8ef3368ff2a28255fe3227303f9a8891d23965df7e7ad5592a9a0dd80afbefb12f0