Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 16:40
Static task
static1
Behavioral task
behavioral1
Sample
ruuyawrj.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ruuyawrj.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
ruuyawrj.dll
-
Size
348KB
-
MD5
dca3f0a3eecf16ac4b72615d712112e9
-
SHA1
909870e8ea76626fbe13e2c960560c2a165bd102
-
SHA256
b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
-
SHA512
4bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 7 3540 rundll32.exe 19 3540 rundll32.exe 33 3540 rundll32.exe 37 3540 rundll32.exe 50 3540 rundll32.exe 65 3540 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3540 1512 rundll32.exe 80 PID 1512 wrote to memory of 3540 1512 rundll32.exe 80 PID 1512 wrote to memory of 3540 1512 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ruuyawrj.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ruuyawrj.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3540
-