Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:21
Behavioral task
behavioral1
Sample
7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48.dll
Resource
win10v2004-20220812-en
General
-
Target
7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48.dll
-
Size
4KB
-
MD5
efa0606885b2a80d102f088014d89500
-
SHA1
c43b5de92e992ef7d2f00acaa6fc933562bc1bbc
-
SHA256
7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48
-
SHA512
fe956f031bf4a591737bd837a99fa7113a1d7ac7b5f36647de41b4c5583d600e907befa5d6f8476aff41dfe2e1d1fe13ccb1119645b4d919fb7e1967e9c68d6e
-
SSDEEP
48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+LVfrZrYripYuSQrAbDQmVLlW5pBkvSH33:TRphMzf8JrtYripY9Q034PBKSHQtU
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/2288-133-0x00000000757F0000-0x00000000757F8000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/2288-133-0x00000000757F0000-0x00000000757F8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 504 wrote to memory of 2288 504 rundll32.exe 79 PID 504 wrote to memory of 2288 504 rundll32.exe 79 PID 504 wrote to memory of 2288 504 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c57810743c399df6e1adfd4a1654394e8bc475e7a7120c1dd9282201dc51b48.dll,#12⤵PID:2288
-