Analysis
-
max time kernel
4294180s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
rtdt.dll
Resource
win7-20220311-en
0 signatures
0 seconds
General
-
Target
rtdt.dll
-
Size
324KB
-
MD5
f1df801459853f42662c0f947518d3e7
-
SHA1
15e292ab8c863f2ba97244ed3f6cb226980580e9
-
SHA256
b02e02ff9b225ad1d2d295800005675fbf2dacd2899b5b939e1070aa2de623e1
-
SHA512
a06911c0e062dc0d6d8803ea4a0332ea8097839d03f3a382b104e78c82d57685aa199033c582936823115253a65f0883e4d0b76c8988d7319e5bed29f9618d13
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1516 rundll32.exe 5 1516 rundll32.exe -
resource yara_rule behavioral1/memory/1516-56-0x0000000010000000-0x0000000010052000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1516 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27 PID 1520 wrote to memory of 1516 1520 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rtdt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rtdt.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1516
-