Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 22:01
Static task
static1
Behavioral task
behavioral1
Sample
12.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
12.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
exe.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
exe.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
sql.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
sql.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
ssleay32.dll
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
ssleay32.dll
Resource
win10v2004-20220414-en
General
-
Target
12.dll
-
Size
10.0MB
-
MD5
6048e9361c3789c78ef93a9291beacc5
-
SHA1
cf8a05ba0aef127e811414b7ae1059b1755512de
-
SHA256
fbb8125816b672c13c34305ba11aa5fc175fa032a6d53604c52d1dd4d7751446
-
SHA512
4e5112c24635ef0fd37cec17d4a46fb376aa083b6eec3777b22899d289fe6966704b6595535fa64258c4afec1f92c7dada89fc8696a66539919f236ee0b9cc2f
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1348-56-0x0000000001F20000-0x0000000004497000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28 PID 1256 wrote to memory of 1348 1256 rundll32.exe 28