Analysis
-
max time kernel
168s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 04:05
Behavioral task
behavioral1
Sample
72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf.dll
-
Size
3KB
-
MD5
5aafaee91818938e72ff02940cf5aa20
-
SHA1
6de8b790134c72a72004e20ac4c68c0d9f5df280
-
SHA256
72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf
-
SHA512
612002285a95d8c809bb782aec4e976789bb5ab5769776738d58717601703007dc5c34306be643c47d02ea92a84b88db0aa2d1ef59b410fe2ad88d3029ef0848
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/1736-133-0x0000000075450000-0x0000000075458000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/1736-133-0x0000000075450000-0x0000000075458000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1736 4956 rundll32.exe 81 PID 4956 wrote to memory of 1736 4956 rundll32.exe 81 PID 4956 wrote to memory of 1736 4956 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72315dc38fea1d8473f847f06e9401f1c1502494b69267e49c6c498bab814fbf.dll,#12⤵PID:1736
-