Analysis
-
max time kernel
123s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-03-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
rtdt.dll
Resource
win7-20220311-en
0 signatures
0 seconds
General
-
Target
rtdt.dll
-
Size
324KB
-
MD5
f1df801459853f42662c0f947518d3e7
-
SHA1
15e292ab8c863f2ba97244ed3f6cb226980580e9
-
SHA256
b02e02ff9b225ad1d2d295800005675fbf2dacd2899b5b939e1070aa2de623e1
-
SHA512
a06911c0e062dc0d6d8803ea4a0332ea8097839d03f3a382b104e78c82d57685aa199033c582936823115253a65f0883e4d0b76c8988d7319e5bed29f9618d13
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 23 3540 rundll32.exe -
resource yara_rule behavioral2/memory/3540-132-0x0000000010000000-0x0000000010052000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3540 rundll32.exe 3540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3540 2188 rundll32.exe 81 PID 2188 wrote to memory of 3540 2188 rundll32.exe 81 PID 2188 wrote to memory of 3540 2188 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rtdt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rtdt.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3540
-