Analysis
-
max time kernel
91s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 01:33
Behavioral task
behavioral1
Sample
0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc.dll
-
Size
3KB
-
MD5
f3bbf4bccd1498f9c0cef088baa6e280
-
SHA1
04bfc82505a026487dacf34620a53d0cc4dc14c6
-
SHA256
0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc
-
SHA512
59315e61a4deee2edfa2796dc6630ba943db436e28316c90f5a04d3370b489c6cac5fe7eafa50027ab4800d4d9d40ae2c513778536ab7f6fc208d35f5d6acac1
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/804-133-0x0000000075020000-0x0000000075028000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/804-133-0x0000000075020000-0x0000000075028000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 804 4040 rundll32.exe 80 PID 4040 wrote to memory of 804 4040 rundll32.exe 80 PID 4040 wrote to memory of 804 4040 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc6cef18305b0c93d4ba665be2193c0b23faaf708fbb85daf4543b4934637fc.dll,#12⤵PID:804
-