Analysis
-
max time kernel
52s -
max time network
17s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
26-08-2020 13:48
Static task
static1
Behavioral task
behavioral1
Sample
printabledocx.dll
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
printabledocx.dll
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
printabledocx.dll
-
Size
293KB
-
MD5
cbfb455108f9b2d783a66a6f9793352d
-
SHA1
7237c3b785c03e1d24ab64464b1c0ce00ef1a4bc
-
SHA256
210cddde479e8b524014a9bacf95299bc7287e342ee49a25d1eead62a6de3ce4
-
SHA512
1c7fed8a955d1747e824195fb7b13c5470ffded3c88714e6bd8512193f7042f7ca1ec7688d7b079a1a2148a20e01ed5b543b9abcf5b5aceb109410a94aa20315
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1152 748 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1152 WerFault.exe 1152 WerFault.exe 1152 WerFault.exe 1152 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1152 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 388 wrote to memory of 748 388 rundll32.exe rundll32.exe PID 748 wrote to memory of 1152 748 rundll32.exe WerFault.exe PID 748 wrote to memory of 1152 748 rundll32.exe WerFault.exe PID 748 wrote to memory of 1152 748 rundll32.exe WerFault.exe PID 748 wrote to memory of 1152 748 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\printabledocx.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\printabledocx.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 2243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/748-0-0x0000000000000000-mapping.dmp
-
memory/748-3-0x0000000000000000-mapping.dmp
-
memory/1152-1-0x0000000000000000-mapping.dmp
-
memory/1152-2-0x0000000002160000-0x0000000002171000-memory.dmpFilesize
68KB
-
memory/1152-4-0x00000000024D0000-0x00000000024E1000-memory.dmpFilesize
68KB