Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 19:30
Static task
static1
Behavioral task
behavioral1
Sample
12.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
12.dll
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
exe.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
exe.exe
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10-en-20211208
Behavioral task
behavioral7
Sample
sql.dll
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
sql.dll
Resource
win10-en-20211208
Behavioral task
behavioral9
Sample
ssleay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
ssleay32.dll
Resource
win10-en-20211208
General
-
Target
12.dll
-
Size
10.0MB
-
MD5
ed6933897c37cfd9a323e177bcb11707
-
SHA1
51123a4b4d3323d01aff81a132314bf1df641008
-
SHA256
a33c96cd2767ab3bff433e90b499c83ff9cba6b16f52797c05ea4fc534a9b1bf
-
SHA512
409bb25c6daef90dfdb0961ed6c4857b6a70bac2f2928b3fd1398ec608c9b31927d8e1ec30a25d8b347669d29471d7debcd18a82a97b9e6dd4c2af851934340a
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1288-118-0x00000000046B0000-0x0000000006DEA000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1288 3728 rundll32.exe 68 PID 3728 wrote to memory of 1288 3728 rundll32.exe 68 PID 3728 wrote to memory of 1288 3728 rundll32.exe 68