Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
05-06-2020 16:46
Static task
static1
Behavioral task
behavioral1
Sample
w.dll
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
w.dll
-
Size
492KB
-
MD5
892fbc87fdbcbe9d91e17ae7355eb54c
-
SHA1
c0e25d2f02a768def644be6c248732da4f91495b
-
SHA256
67b46301815d5ba32f90af114a459810902ba6d97a75821c8455b8103073b499
-
SHA512
09c30eef3c57be57ef396ff1c2de92f0cff1b57bea0e56ab6401b844b4c5982c7a56f3ef708d0aff2bb6ea1baaef5cf39098b6623bc529c579b35ad73ea4039a
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3604 set thread context of 2500 3604 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2500 msiexec.exe Token: SeSecurityPrivilege 2500 msiexec.exe -
Blacklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid process 11 2500 msiexec.exe 13 2500 msiexec.exe 15 2500 msiexec.exe 17 2500 msiexec.exe 18 2500 msiexec.exe 19 2500 msiexec.exe 20 2500 msiexec.exe 23 2500 msiexec.exe 24 2500 msiexec.exe 26 2500 msiexec.exe 28 2500 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3824 wrote to memory of 3604 3824 rundll32.exe rundll32.exe PID 3824 wrote to memory of 3604 3824 rundll32.exe rundll32.exe PID 3824 wrote to memory of 3604 3824 rundll32.exe rundll32.exe PID 3604 wrote to memory of 2500 3604 rundll32.exe msiexec.exe PID 3604 wrote to memory of 2500 3604 rundll32.exe msiexec.exe PID 3604 wrote to memory of 2500 3604 rundll32.exe msiexec.exe PID 3604 wrote to memory of 2500 3604 rundll32.exe msiexec.exe PID 3604 wrote to memory of 2500 3604 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2500-0-0x00000000026D0000-0x00000000026FB000-memory.dmpFilesize
172KB