Analysis
-
max time kernel
123s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
19-05-2020 07:30
Static task
static1
Behavioral task
behavioral1
Sample
iTBDXzF.bin.dll
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
iTBDXzF.bin.dll
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
iTBDXzF.bin.dll
-
Size
2.8MB
-
MD5
5057e9d2ca0f7b22d18d9823b99c7cba
-
SHA1
dd671fa5e34d5b5b7f6dc6100f746f490b83db6e
-
SHA256
55bcab507b73fd2d184d9326b69553910c223b28e512707771818de96136c52f
-
SHA512
b696e8e0e2bdfc6e78db8e5bfbc63e8e5caf0e8e67217e9e54a91ace83e5647a328b8fd64e1210cfe6394982f4a804936f19fea3fbd04e337be83e620b2df380
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 7 2212 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2668 1176 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2668 WerFault.exe Token: SeBackupPrivilege 2668 WerFault.exe Token: SeDebugPrivilege 2668 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2536 wrote to memory of 1176 2536 rundll32.exe rundll32.exe PID 2536 wrote to memory of 1176 2536 rundll32.exe rundll32.exe PID 2536 wrote to memory of 1176 2536 rundll32.exe rundll32.exe PID 1176 wrote to memory of 2212 1176 rundll32.exe rundll32.exe PID 1176 wrote to memory of 2212 1176 rundll32.exe rundll32.exe PID 1176 wrote to memory of 2212 1176 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\iTBDXzF.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\iTBDXzF.bin.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\iTBDXzF.bin.dll,f03⤵
- Blocklisted process makes network request
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 8083⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668