Analysis
-
max time kernel
88s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 15:48
Behavioral task
behavioral1
Sample
ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561.dll
-
Size
3KB
-
MD5
6c452c47ab6e6fa36ada964e12075041
-
SHA1
c29f3242086bcc09029ca92d4a7c71270375cb29
-
SHA256
ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561
-
SHA512
586e1b4f27133918c135ec0e83604504d4d1bdfa3acc3bdd4b5723bd9a7226abbc7b4834df475ac980d3bd52836bbc02764118175fa064bdb5ac6adc8f96570a
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4468-133-0x0000000075620000-0x0000000075628000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/4468-133-0x0000000075620000-0x0000000075628000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4468 4280 rundll32.exe 67 PID 4280 wrote to memory of 4468 4280 rundll32.exe 67 PID 4280 wrote to memory of 4468 4280 rundll32.exe 67
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce108c1fc58f275aec320b0737d56d3a978fd9f2086a81c24137b82086054561.dll,#12⤵PID:4468
-