Analysis
-
max time kernel
93s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:41
Behavioral task
behavioral1
Sample
24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856.dll
-
Size
3KB
-
MD5
808497d8a1a961d423cd5018d0756b33
-
SHA1
964dd6a649d97dfd2ad461ce1b205d31b498faa0
-
SHA256
24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856
-
SHA512
c9ecc852157538b55a4a0b4fb94336e9e2b39b956d2460a71a691d5c3023d5a3a8dff23cbb728b9253b06998bbcf49932c935ddb93aaff5465ebdb451c5ab922
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4416-133-0x00000000752C0000-0x00000000752C8000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/4416-133-0x00000000752C0000-0x00000000752C8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4416 3480 rundll32.exe 82 PID 3480 wrote to memory of 4416 3480 rundll32.exe 82 PID 3480 wrote to memory of 4416 3480 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24d251f902beb3cfdf5131e4ff9d87c6f63a874eec7976f3f217197ec4d48856.dll,#12⤵PID:4416
-