Analysis
-
max time kernel
161s -
max time network
196s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
12.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
12.dll
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
exe.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
exe.exe
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10-en-20211208
Behavioral task
behavioral7
Sample
sql.dll
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
sql.dll
Resource
win10-en-20211208
Behavioral task
behavioral9
Sample
ssleay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
ssleay32.dll
Resource
win10-en-20211208
General
-
Target
12.dll
-
Size
10.0MB
-
MD5
f5c9f86cde17352657ef69da4883f025
-
SHA1
30fa7995ebfc18d34f6091b5cecf2076243338c2
-
SHA256
17d2409a2646401f6652a4612d7ed3df8d654461c88b4412b9cf1c7462f65af8
-
SHA512
baadaa071263e21cc22e2362d619ab510bfb3edd916a282573f3d5cf7952bc1e7b3ee4210cb4d705f7a2d34eb59bbad15733f6d5ec74fa7414fab8927920653b
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4000-115-0x0000000004A90000-0x000000000700C000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4000 4188 rundll32.exe 69 PID 4188 wrote to memory of 4000 4188 rundll32.exe 69 PID 4188 wrote to memory of 4000 4188 rundll32.exe 69