Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 16:15
Static task
static1
Behavioral task
behavioral1
Sample
1597b0f644a89509472cae64a63c79aaf545c9712cde453849e79178a4be1519.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1597b0f644a89509472cae64a63c79aaf545c9712cde453849e79178a4be1519.dll
Resource
win10v2004-en-20220113
General
-
Target
1597b0f644a89509472cae64a63c79aaf545c9712cde453849e79178a4be1519.dll
-
Size
246KB
-
MD5
83c7f534ec89eaf9250d1c0c79d3fa3b
-
SHA1
7a0441ca08d44d8597804c3c2682950f98ef708d
-
SHA256
1597b0f644a89509472cae64a63c79aaf545c9712cde453849e79178a4be1519
-
SHA512
927f6e8af8ce15908e35d7612b6b63d1010f767a5bf22adee33d0cb21c66baa95d6ebf34b3f24b9aecaddf6a543e42409d7563d702bb54353bcebf0fe5246b73
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 1684 rundll32.exe 4 1684 rundll32.exe 5 1684 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1684 rundll32.exe