Analysis
-
max time kernel
200s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 22:46
Behavioral task
behavioral1
Sample
884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495.dll
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495.dll
-
Size
3KB
-
MD5
ab7098ede68ad98d927080cd3d544720
-
SHA1
aa4fd8ed23b989695579b8a40d5220e81f3d9201
-
SHA256
884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495
-
SHA512
6e264526c7033ea44ef8bb883a199fbd9fd55a1df0340dc4415f6e94513c751faaf8a9133a81f1f965bf0ba8a423a6394b58fa1fbad0160393cd0aef89325df7
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/2912-133-0x00000000750D0000-0x00000000750D8000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/2912-133-0x00000000750D0000-0x00000000750D8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3940 wrote to memory of 2912 3940 rundll32.exe 82 PID 3940 wrote to memory of 2912 3940 rundll32.exe 82 PID 3940 wrote to memory of 2912 3940 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\884a371cf2c2ba12b64ea19d8881efb506ec5a1b5473fe8500114a6b0705d495.dll,#12⤵PID:2912
-