Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 07:53
Static task
static1
Behavioral task
behavioral1
Sample
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll
Resource
win10v2004-20220414-en
General
-
Target
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll
-
Size
141KB
-
MD5
38bd1d49f88201a9a6a92ae3f65559c0
-
SHA1
010847f30975fbac9a45ffc6e70ed640614e4852
-
SHA256
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab
-
SHA512
4ff916f7ea78fbd0c0fbb663dc53d8a6060fae819a7f0da09d114d832dde1634943cb603787954fdb0a5fbae20bcc0a2d29157f7b7a1139c8f41424a655db858
Malware Config
Signatures
-
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
-
suricata: ET MALWARE Locky CnC checkin Nov 21
suricata: ET MALWARE Locky CnC checkin Nov 21
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 1 1916 rundll32.exe 2 1916 rundll32.exe 15 1916 rundll32.exe 20 1916 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll,#12⤵
- Blocklisted process makes network request
PID:1916