Analysis
-
max time kernel
172s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:19
Behavioral task
behavioral1
Sample
cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49.dll
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49.dll
-
Size
3KB
-
MD5
38c5dbcb8dc51e7a498b83adb3c6d8d0
-
SHA1
adfaf1410da5546ad8bfe98519c820906ec56d26
-
SHA256
cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49
-
SHA512
bcb028bc6cf6be522bda824ae22154a467434a7af4bf96d1af565818d14552419f9118d5ab3f01e49a38404cbd3c28b22cc36657660872ceb4ad2ffdee245d59
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/824-133-0x0000000074E10000-0x0000000074E18000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/824-133-0x0000000074E10000-0x0000000074E18000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5028 wrote to memory of 824 5028 rundll32.exe 82 PID 5028 wrote to memory of 824 5028 rundll32.exe 82 PID 5028 wrote to memory of 824 5028 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdd70c409dac486ec5640e3022eddd8685b7914e61b82821353d2064cf5fcf49.dll,#12⤵PID:824
-