Analysis
-
max time kernel
6s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 17:18
Static task
static1
Behavioral task
behavioral1
Sample
18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca.dll
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca.dll
-
Size
675KB
-
MD5
46ea0661444ba5f0c09c59938883fcaa
-
SHA1
dee40cdb15046a6a1f47445b6202034e9a0d77e6
-
SHA256
18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca
-
SHA512
df0fc73283f7fe95c5db87b01981b708c32ab048ebf0234fd9c7273b1b6e530dd610409a7b0680b38527795f1ebb771569d185976aace3d1bfca8680921cfbac
Malware Config
Signatures
-
Templ.dll packer 3 IoCs
Detects Templ.dll packer which usually loads Trickbot.
resource yara_rule behavioral1/memory/2032-4-0x0000000000330000-0x0000000000369000-memory.dmp templ_dll behavioral1/memory/2032-5-0x00000000003A0000-0x00000000003D7000-memory.dmp templ_dll behavioral1/memory/2032-6-0x00000000001D0000-0x0000000000206000-memory.dmp templ_dll -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26 PID 1856 wrote to memory of 2032 1856 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca.dll,#12⤵PID:2032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:324
-
-