Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
01/11/2021, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83.dll
Resource
win10-en-20210920
General
-
Target
73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83.dll
-
Size
28KB
-
MD5
ce1e907e5709d82ce68748e16e53f3d1
-
SHA1
6730bafd618c8ad45bbcc6054566cb34e9d156ee
-
SHA256
73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83
-
SHA512
d0f3803812655929b6ba1e2098269093a09e7b8fdba0b8fec43da15b2856c540101314b683555caf7cc770add122af20819ca002da67d61c30d314acb434ea83
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 3048 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3048 rundll32.exe 3048 rundll32.exe 3048 rundll32.exe 3048 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3048 2704 rundll32.exe 68 PID 2704 wrote to memory of 3048 2704 rundll32.exe 68 PID 2704 wrote to memory of 3048 2704 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3048
-