Overview
overview
7Static
static
796c4b7f0b5...2b.exe
windows7-x64
396c4b7f0b5...2b.exe
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/XML.dll
windows7-x64
3$PLUGINSDIR/XML.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$TEMP/kcheck.dll
windows7-x64
7$TEMP/kcheck.dll
windows10-2004-x64
7kcheck2.dll
windows7-x64
1kcheck2.dll
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 08:56
Behavioral task
behavioral1
Sample
96c4b7f0b5f386e7157dee8d6873812b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96c4b7f0b5f386e7157dee8d6873812b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/XML.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/XML.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/linker.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/linker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$TEMP/kcheck.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$TEMP/kcheck.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
kcheck2.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
kcheck2.dll
Resource
win10v2004-20231215-en
General
-
Target
$TEMP/kcheck.dll
-
Size
3KB
-
MD5
d7abd1fa2c2bf8d37b38851d498bf4bf
-
SHA1
4701dfb6ccab99988278540c4326c09ea7a2551a
-
SHA256
e11a73b3bc733d4ccb6fc334a1e205e5a8b5183bf376f0b268f900b3165d5613
-
SHA512
1e654cabdb8f850da70f6c98eb017c649cbb14a4a69f5848dd2753dcfb78b256c45cb6fefad3be13fe00dcf51fcb1b526b5226d4a6d31e8fbaa29b24398cd15f
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral18/memory/4696-0-0x0000000010000000-0x0000000010008000-memory.dmp acprotect -
resource yara_rule behavioral18/memory/4696-0-0x0000000010000000-0x0000000010008000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4696 1644 rundll32.exe 83 PID 1644 wrote to memory of 4696 1644 rundll32.exe 83 PID 1644 wrote to memory of 4696 1644 rundll32.exe 83