Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:15
Behavioral task
behavioral1
Sample
95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550.dll
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550.dll
-
Size
3KB
-
MD5
95de131a19132be0f96c969cdc20c030
-
SHA1
63f8a3ecdedb765c015dd6b15e44a5db7e5efe06
-
SHA256
95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550
-
SHA512
e12e7ac8c191b66003a0ccb09412a40adaf496d52e73318fd052e9990ed7dd04caf35a153abf9c4685d9875b58d486c389d3f9878307c1e9109d7e6c9e6460d9
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4932-133-0x0000000074AF0000-0x0000000074AF8000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/4932-133-0x0000000074AF0000-0x0000000074AF8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4932 4996 rundll32.exe 74 PID 4996 wrote to memory of 4932 4996 rundll32.exe 74 PID 4996 wrote to memory of 4932 4996 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95255effc1cd931d0c8ddab95f4e1ee4d42dfc71ea70491ecfdd31a3ba735550.dll,#12⤵PID:4932
-