Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:22
Behavioral task
behavioral1
Sample
6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74.dll
Resource
win10v2004-20220812-en
General
-
Target
6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74.dll
-
Size
4KB
-
MD5
c1cdae700c5d28afcb7c1ee963d93410
-
SHA1
45774ea1b14fb46be0dd1ff8550ecc34cdd5326b
-
SHA256
6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74
-
SHA512
aaeaa20109ffbae26e19125abe418b641923049441acad9ecd02f908e5e88b021781cab76be9139268c39691d8e54032ed32b70db1a80bb10635be4441236552
-
SSDEEP
48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+LM26v/B1fYa0JxwnLu835:TRphMzf8M2YrA4LuA
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4088-133-0x0000000074C50000-0x0000000074C58000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/4088-133-0x0000000074C50000-0x0000000074C58000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 4088 1424 rundll32.exe 79 PID 1424 wrote to memory of 4088 1424 rundll32.exe 79 PID 1424 wrote to memory of 4088 1424 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6254f41cd50f9d2efc2402ba399f59b7d1091e44e60d2d795de1891698f84d74.dll,#12⤵PID:4088
-