Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:20
Behavioral task
behavioral1
Sample
26c68973e7a34e95a30d89032ec4f966d1b11af3c4666bbb31e539cf40811bfaN.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
26c68973e7a34e95a30d89032ec4f966d1b11af3c4666bbb31e539cf40811bfaN.dll
-
Size
3KB
-
MD5
eef344bde2396e0cad231343793b85f0
-
SHA1
e8c47ae7d280467f0ec0069da89b6c3c66685df8
-
SHA256
26c68973e7a34e95a30d89032ec4f966d1b11af3c4666bbb31e539cf40811bfa
-
SHA512
42a4b4a60b1817ac8979a57f9726f4ab35939ea1f1b34e43ab737d5b8c20d6ca82dee326516157184448a3ceb1b727e0f850192f9037a9bf63f27070b5a6c7aa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/memory/2136-1-0x00000000746A0000-0x00000000746A8000-memory.dmp acprotect behavioral1/memory/2136-0-0x00000000746B0000-0x00000000746B8000-memory.dmp acprotect -
resource yara_rule behavioral1/memory/2136-1-0x00000000746A0000-0x00000000746A8000-memory.dmp upx behavioral1/memory/2136-0-0x00000000746B0000-0x00000000746B8000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26c68973e7a34e95a30d89032ec4f966d1b11af3c4666bbb31e539cf40811bfaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26c68973e7a34e95a30d89032ec4f966d1b11af3c4666bbb31e539cf40811bfaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2136
-