Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 07:48
Behavioral task
behavioral1
Sample
bzskttaekj.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bzskttaekj.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
e88ko0d78vu956w795ggg.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
e88ko0d78vu956w795ggg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
ssleay32.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
ssleay32.dll
Resource
win10v2004-20220414-en
General
-
Target
ssleay32.dll
-
Size
106KB
-
MD5
931c97553b3319f21b9ef249aa3cd244
-
SHA1
42c6611da2154bb6e0911993cf97071908b48bf2
-
SHA256
7e643c188a1ee3b0251b7dfcab000b7c48fd840eff35189e8a45901852e3910a
-
SHA512
790141b758aa68c6384aaf6f85b09f9bc641a300a4e7fa05a74c3f89af090fbbfdcfe3dce24842a8d0c75b874839d505692c1951ed66f57e9840c559820514d3
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral7/memory/2032-56-0x0000000000970000-0x0000000000AB9000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2032 1684 rundll32.exe rundll32.exe