Analysis
-
max time kernel
3s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 04:51
Behavioral task
behavioral1
Sample
82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f.dll
Resource
win10v2004-20221111-en
General
-
Target
82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f.dll
-
Size
4KB
-
MD5
d00462e2c2e2c127450dce3d7ffdc810
-
SHA1
bca95d472ee0632cfbe8952ccba5992755dac9f4
-
SHA256
82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f
-
SHA512
c72d118f8a9955fb47336405654703e08ecedea4e65b9faf1b4756984bb930e502b8e512722e844768d9211aeb085115584827edea18c788e1215943f6390005
-
SSDEEP
96:TRphMzf8gADt3cWGwzNtFHwXKcroeWFTGEWx:NpOr8gAtMXZKcLiTG1x
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/memory/1208-57-0x00000000747A0000-0x00000000747A8000-memory.dmp acprotect -
resource yara_rule behavioral1/memory/1208-57-0x00000000747A0000-0x00000000747A8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28 PID 2040 wrote to memory of 1208 2040 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82e0bd64ceb600730e55ad206dcd4c61067504a95b45a3f41ff6a2eb732d2b2f.dll,#12⤵PID:1208
-