Overview
overview
8Static
static
NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8Analysis
-
max time kernel
48s -
max time network
60s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 01:18
Static task
static1
Behavioral task
behavioral1
Sample
E1-20191211_134358.dll
Resource
win10v20201028
Behavioral task
behavioral2
Sample
E1-20210112_173733.dll
Resource
win10v20201028
Behavioral task
behavioral3
Sample
E1-20210112_211120.dll
Resource
win10v20201028
Behavioral task
behavioral4
Sample
E1-20210112_221451.dll
Resource
win10v20201028
Behavioral task
behavioral5
Sample
E1-20210112_230552.dll
Resource
win10v20201028
Behavioral task
behavioral6
Sample
E2-20191211_134358.dll
Resource
win10v20201028
Behavioral task
behavioral7
Sample
E2-20210112_173730.dll
Resource
win10v20201028
Behavioral task
behavioral8
Sample
E2-20210112_211117.dll
Resource
win10v20201028
Behavioral task
behavioral9
Sample
E2-20210112_221448.dll
Resource
win10v20201028
Behavioral task
behavioral10
Sample
E2-20210112_230549.dll
Resource
win10v20201028
Behavioral task
behavioral11
Sample
E3-20191210_121355.dll
Resource
win10v20201028
Behavioral task
behavioral12
Sample
E3-20210112_173736.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
E3-20210112_211123.dll
Resource
win10v20201028
Behavioral task
behavioral14
Sample
E3-20210112_221455.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
E3-20210112_230555.dll
Resource
win10v20201028
General
-
Target
E1-20210112_211120.dll
-
Size
329KB
-
MD5
f0f010b670c71181195f94d189ec8b53
-
SHA1
1ca5b0b9cc00bc4a764b5ee00ca5aaf4a981a903
-
SHA256
55eeb041b6efeb4fba80c2cc36f16266d2d83040a780b04cdc836952099d8e3f
-
SHA512
3049eea8509b27378d94e2f66b2397358fcc1f1e017f56a8280b81b70ef6cfb89a35e1ddda9e20bf315ed3a6ed56a38d74b3b8d9d228171d575a43c2f1865bb6
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 10 708 rundll32.exe 13 708 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Hfljgsjckp\omghrbhfd.cuw rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exepid process 708 rundll32.exe 708 rundll32.exe 708 rundll32.exe 708 rundll32.exe 708 rundll32.exe 708 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1388 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.exerundll32.exedescription pid process target process PID 1180 wrote to memory of 1388 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1388 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1388 1180 rundll32.exe rundll32.exe PID 1388 wrote to memory of 212 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 212 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 212 1388 rundll32.exe rundll32.exe PID 212 wrote to memory of 708 212 rundll32.exe rundll32.exe PID 212 wrote to memory of 708 212 rundll32.exe rundll32.exe PID 212 wrote to memory of 708 212 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E1-20210112_211120.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E1-20210112_211120.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hfljgsjckp\omghrbhfd.cuw",JsSnu3⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Hfljgsjckp\omghrbhfd.cuw",#14⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
-