Analysis
-
max time kernel
97s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 09:55
Behavioral task
behavioral1
Sample
fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c.dll
-
Size
3KB
-
MD5
61ded373e81ee3e18540e6cb687d4fa9
-
SHA1
180dfadbb8dc2b055618e9620125778277d064e9
-
SHA256
fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c
-
SHA512
1d1374adde14f5da8cbbd28cef0aef45b956ac8188e4e2cdf42caeb2d7209d5efc75ee93674c5d963c9be352c36a879a4e9dd25a0d8771bf1f40d313c1633792
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/3872-133-0x0000000074F70000-0x0000000074F78000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/3872-133-0x0000000074F70000-0x0000000074F78000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 3872 4476 rundll32.exe 79 PID 4476 wrote to memory of 3872 4476 rundll32.exe 79 PID 4476 wrote to memory of 3872 4476 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd2be10fe4d05ecf627d14a5eff711d8e4a2683060928e112f394a9021fd808c.dll,#12⤵PID:3872
-