Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-04-2022 19:51
Static task
static1
Behavioral task
behavioral1
Sample
tgzrnhae.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
tgzrnhae.dll
-
Size
348KB
-
MD5
dca3f0a3eecf16ac4b72615d712112e9
-
SHA1
909870e8ea76626fbe13e2c960560c2a165bd102
-
SHA256
b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
-
SHA512
4bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 3 1628 rundll32.exe 5 1628 rundll32.exe 6 1628 rundll32.exe 7 1628 rundll32.exe 8 1628 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28 PID 1436 wrote to memory of 1628 1436 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tgzrnhae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tgzrnhae.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1628
-