Overview
overview
8Static
static
NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8NoNet
windows10_x64
8Analysis
-
max time kernel
42s -
max time network
54s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 01:18
Static task
static1
Behavioral task
behavioral1
Sample
E1-20191211_134358.dll
Resource
win10v20201028
Behavioral task
behavioral2
Sample
E1-20210112_173733.dll
Resource
win10v20201028
Behavioral task
behavioral3
Sample
E1-20210112_211120.dll
Resource
win10v20201028
Behavioral task
behavioral4
Sample
E1-20210112_221451.dll
Resource
win10v20201028
Behavioral task
behavioral5
Sample
E1-20210112_230552.dll
Resource
win10v20201028
Behavioral task
behavioral6
Sample
E2-20191211_134358.dll
Resource
win10v20201028
Behavioral task
behavioral7
Sample
E2-20210112_173730.dll
Resource
win10v20201028
Behavioral task
behavioral8
Sample
E2-20210112_211117.dll
Resource
win10v20201028
Behavioral task
behavioral9
Sample
E2-20210112_221448.dll
Resource
win10v20201028
Behavioral task
behavioral10
Sample
E2-20210112_230549.dll
Resource
win10v20201028
Behavioral task
behavioral11
Sample
E3-20191210_121355.dll
Resource
win10v20201028
Behavioral task
behavioral12
Sample
E3-20210112_173736.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
E3-20210112_211123.dll
Resource
win10v20201028
Behavioral task
behavioral14
Sample
E3-20210112_221455.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
E3-20210112_230555.dll
Resource
win10v20201028
General
-
Target
E2-20210112_173730.dll
-
Size
332KB
-
MD5
0c30c16d7223afd443251a117ffebd9b
-
SHA1
2708bdea5bf694974d92bb3843e6041061ed6ee7
-
SHA256
4aed7b3ade19e0e4ffabc13ad03713d2bafc003e9f489422f744eb3c463bf204
-
SHA512
b4676fcd5941387aee986d137780beba205ea830365ed3d3283aec811350f7234eb218a732f06a202d4abbe8e9f0eb4798c96e3658eb4f05056b5b271ce2370e
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 10 4316 rundll32.exe 14 4316 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Tcsgzs\fkjgc.avx rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exepid process 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4820 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4764 wrote to memory of 4820 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 4820 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 4820 4764 rundll32.exe rundll32.exe PID 4820 wrote to memory of 4316 4820 rundll32.exe rundll32.exe PID 4820 wrote to memory of 4316 4820 rundll32.exe rundll32.exe PID 4820 wrote to memory of 4316 4820 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E2-20210112_173730.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E2-20210112_173730.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Tcsgzs\fkjgc.avx",ShowDialogA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-