Analysis
-
max time kernel
4294214s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6.dll
Resource
win10v2004-20220310-en
General
-
Target
03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6.dll
-
Size
25KB
-
MD5
c86d3b39a9c0f72513f4aae8327fd0e8
-
SHA1
8d6fd0696111777073e1e891dcf5654de89a8d21
-
SHA256
03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6
-
SHA512
987a089db0a32522a8fbd537193a08e88455646076968700c2b58edb1a6056021ee288fb17ca8402b40e71c575a0ee5f66e4803c7437d905b423762e1ca48379
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 6 1124 rundll32.exe 8 1124 rundll32.exe 14 1124 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1124 rundll32.exe 1124 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27 PID 1484 wrote to memory of 1124 1484 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03dbd7e7306a8bf50b6423d1df0bf259177f32380e48a147ec0e842487c0bfb6.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1124
-