Analysis
-
max time kernel
3s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-10-2020 14:15
Static task
static1
Behavioral task
behavioral1
Sample
RedDelta_PlugX.bin.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RedDelta_PlugX.bin.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
RedDelta_PlugX.bin.dll
-
Size
135KB
-
MD5
9f794a5c213e76bc458882f392a931d0
-
SHA1
74e7e0219107c72239856b099b3e68ec06eb1de5
-
SHA256
65f995096075e85939b42fec41a59fac6c7bbdc586deed10a696fa313a85be8c
-
SHA512
1b10adfc19bbc8d72b8602d77e564d63381cb46b26530240e5adc10fa8dd6d55ec04c35efa8649cc969f38312458de84d6d7ebdf4eaf8150c8b7641d3684d8e8
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1172 1648 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1172 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1648 1756 rundll32.exe rundll32.exe PID 1648 wrote to memory of 1172 1648 rundll32.exe WerFault.exe PID 1648 wrote to memory of 1172 1648 rundll32.exe WerFault.exe PID 1648 wrote to memory of 1172 1648 rundll32.exe WerFault.exe PID 1648 wrote to memory of 1172 1648 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RedDelta_PlugX.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RedDelta_PlugX.bin.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 2243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-