Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10_x64 -
resource
win10 -
submitted
07/08/2020, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¹Ù·½ÍøÕ¾.url
Resource
win7v200722
Behavioral task
behavioral2
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¹Ù·½ÍøÕ¾.url
Resource
win10v200722
Behavioral task
behavioral3
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/CQA.exe
Resource
win7v200722
Behavioral task
behavioral4
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/CQA.exe
Resource
win10
Behavioral task
behavioral5
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/bin/libeay32.dll
Resource
win7v200722
Behavioral task
behavioral6
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/bin/libeay32.dll
Resource
win10v200722
Behavioral task
behavioral7
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/bin/zlib1.dll
Resource
win7v200722
Behavioral task
behavioral8
Sample
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/bin/zlib1.dll
Resource
win10
General
-
Target
[Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/bin/zlib1.dll
-
Size
105KB
-
MD5
b8a9e91134e7c89440a0f95470d5e47b
-
SHA1
3cbcee30fc0a7e9807931bc0dafceb627042bfc9
-
SHA256
42967a768f341d9ce5174eb38a4d63754c3c41739e7d88f4e39cd7354c1fac71
-
SHA512
e8583ea94b9d1321889359317e367abc88e90e96d0d9243258244a527ffa2b13ab97d0787693ca328960ceb934ea11eefd14abafd640a654473c26e420d2ec54
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3940 WerFault.exe Token: SeBackupPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe -
ServiceHost packer 2 IoCs
Detects ServiceHost packer used for .NET malware
resource yara_rule behavioral8/memory/3216-2-0x0000000000000000-mapping.dmp servicehost behavioral8/memory/3216-3-0x0000000000000000-mapping.dmp servicehost -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3828 wrote to memory of 3216 3828 rundll32.exe 67 PID 3828 wrote to memory of 3216 3828 rundll32.exe 67 PID 3828 wrote to memory of 3216 3828 rundll32.exe 67 -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 3216 WerFault.exe 67
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\[Dev] ¿áQ Air [Õýʽ°æ]\¿áQ Air\bin\zlib1.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\[Dev] ¿áQ Air [Õýʽ°æ]\¿áQ Air\bin\zlib1.dll",#12⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6163⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Program crash
PID:3940
-
-