Analysis
-
max time kernel
6s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-03-2021 09:55
Static task
static1
Behavioral task
behavioral1
Sample
12.0.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
12.0.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
12.0.dll
-
Size
37KB
-
MD5
af18cd9e59906e5c56bd5a07502b1f0b
-
SHA1
3bc5960b69cbd0266e66dfea9e6d9eb6365ae78a
-
SHA256
93db19c454405ef70de2ead0a3b2158e0d8cc8c3bb663c3af15a0df1b008fc53
-
SHA512
35e56125884be604b45d11fc318d022bbd021ff83f8cc41fe606d91eb8f6a4770e319ff92fc9ff0119c3bbc34557be0ac41f64d90538186852269efd54144281
Malware Config
Signatures
-
Nloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000010000000-0x000000001000C000-memory.dmp nloader -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 2 1196 rundll32.exe 5 1196 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1196 1888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12.0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12.0.dll,#12⤵
- Blocklisted process makes network request
PID:1196