Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
02-07-2020 16:16
Static task
static1
Behavioral task
behavioral1
Sample
tfR5r4pw.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
tfR5r4pw.dll
-
Size
634KB
-
MD5
004d3ff1fe0ec1d0a90913f1238f293f
-
SHA1
fe3a1f35f5c21ce72a1ef05cbf2824a51827a5f2
-
SHA256
3dd800b875aa0ef2fa0923babdd4b162555a1c3ff3c58e9291d45fff82389816
-
SHA512
d8ad97df2d05d9ab88ed3e96e2e7c24efb57ec090737943f52548b1c39e2de9eaf270e20baa0728a31ffdc8745444abf18c07dbca4cce3f3a553c0709d8693ea
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3904 created 796 3904 WerFault.exe rundll32.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 796 created 3024 796 rundll32.exe Explorer.EXE -
ServiceHost packer 1 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/796-4-0x0000000000000000-mapping.dmp servicehost -
Blacklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid process 8 2800 msiexec.exe 9 2800 msiexec.exe 10 2800 msiexec.exe 11 2800 msiexec.exe 12 2800 msiexec.exe 13 2800 msiexec.exe 15 2800 msiexec.exe 17 2800 msiexec.exe 19 2800 msiexec.exe 21 2800 msiexec.exe 23 2800 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 796 set thread context of 2800 796 rundll32.exe msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3904 796 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
rundll32.exeWerFault.exepid process 796 rundll32.exe 796 rundll32.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe 3904 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
rundll32.exeWerFault.exemsiexec.exedescription pid process Token: SeDebugPrivilege 796 rundll32.exe Token: SeRestorePrivilege 3904 WerFault.exe Token: SeBackupPrivilege 3904 WerFault.exe Token: SeDebugPrivilege 3904 WerFault.exe Token: SeSecurityPrivilege 2800 msiexec.exe Token: SeSecurityPrivilege 2800 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 640 wrote to memory of 796 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 796 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 796 640 rundll32.exe rundll32.exe PID 796 wrote to memory of 2800 796 rundll32.exe msiexec.exe PID 796 wrote to memory of 2800 796 rundll32.exe msiexec.exe PID 796 wrote to memory of 2800 796 rundll32.exe msiexec.exe PID 796 wrote to memory of 2800 796 rundll32.exe msiexec.exe PID 796 wrote to memory of 2800 796 rundll32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tfR5r4pw.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tfR5r4pw.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 5964⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/796-0-0x0000000000000000-mapping.dmp
-
memory/796-4-0x0000000000000000-mapping.dmp
-
memory/2800-1-0x0000000003240000-0x000000000326C000-memory.dmpFilesize
176KB
-
memory/2800-2-0x0000000000000000-mapping.dmp
-
memory/3904-3-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/3904-5-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB