Analysis
-
max time kernel
146s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 22:07
Behavioral task
behavioral1
Sample
NEAS.797e273e0c2590fcae0add13716c6950_JC.dll
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.797e273e0c2590fcae0add13716c6950_JC.dll
Resource
win10v2004-20231020-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
NEAS.797e273e0c2590fcae0add13716c6950_JC.dll
-
Size
3KB
-
MD5
797e273e0c2590fcae0add13716c6950
-
SHA1
5f3e0dec820d1afb31ea70907dc16e30ff3e652f
-
SHA256
11ab11a073209ad73c5d80802e7596de5d67a57781cd995b7d3629f952d84e96
-
SHA512
b9935fff767df18be9358bfc219afd24f59a4324c86db113d6be08e8fb47767ec453501370856ce056ae38c21540c800fe13290a8936822c7563b3e9d96de1c6
Score
7/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/5072-0-0x0000000074D60000-0x0000000074D68000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/5072-0-0x0000000074D60000-0x0000000074D68000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 5072 2308 rundll32.exe 88 PID 2308 wrote to memory of 5072 2308 rundll32.exe 88 PID 2308 wrote to memory of 5072 2308 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.797e273e0c2590fcae0add13716c6950_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.797e273e0c2590fcae0add13716c6950_JC.dll,#12⤵PID:5072
-