Analysis
-
max time kernel
104s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
71cff9414b7367b65c96e8e98a2ee019f44eaa7e0d7d0f2d086a517c0d7cffb7.dll
Resource
win7-20220414-en
General
-
Target
71cff9414b7367b65c96e8e98a2ee019f44eaa7e0d7d0f2d086a517c0d7cffb7.dll
-
Size
541KB
-
MD5
a6edb6cb8f14e1a7cee7427ffafacb23
-
SHA1
0edeb470ec8736417ad1eb02a7c2191c2e92529f
-
SHA256
71cff9414b7367b65c96e8e98a2ee019f44eaa7e0d7d0f2d086a517c0d7cffb7
-
SHA512
ec6e5b1c841c08f26584fc0f7baa2aa6a70098ba1d1fb06880758dbce9bc80911f94ee6b5eddbd9679ee0eeb080ad43de40ebf2d726a744a57c3f3b801828142
Malware Config
Extracted
zloader
nut
16/10
https://rkhydraulic.com/gqvvjx.php
https://sadarpursangbad.com/eraksa.php
https://t20group.com/atufik.php
https://voldemarholding.ee/b6h7s1.php
https://reach-me.co/oay1hk.php
https://acpdd.cat/sv34fs.php
https://aestheticscc.com/wbbako.php
https://procalterfineb.tk/wp-smarts.php
-
build_id
170
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4088 3352 rundll32.exe 83 PID 3352 wrote to memory of 4088 3352 rundll32.exe 83 PID 3352 wrote to memory of 4088 3352 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71cff9414b7367b65c96e8e98a2ee019f44eaa7e0d7d0f2d086a517c0d7cffb7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71cff9414b7367b65c96e8e98a2ee019f44eaa7e0d7d0f2d086a517c0d7cffb7.dll,#12⤵PID:4088
-