Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:56
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll
-
Size
3.3MB
-
MD5
87d9f26e60c839281621348244e7a50e
-
SHA1
03cdedd359cf66d388f96c6aa48c9ba75469db72
-
SHA256
a5bd1ac8e6458e40e63cf558145dbd06cc2700d97f9ed3ae5a161b165ca6c035
-
SHA512
82f9de782234b46938e80cd357f847f4a5bdd8a75f7d412fc10fde3e4d9ef336e6db7f7b05c22859cb4344d3c20de69456916f5c8c1d14906edfbb4a0da682b3
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 2 1220 rundll32.exe 3 1220 rundll32.exe 8 1220 rundll32.exe 9 1220 rundll32.exe 10 1220 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1148 1948 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1148 WerFault.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1948 1668 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1220 1948 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1148 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1148 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1148 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1148 1948 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Graftor.752710.22488.21345.dll,f03⤵
- Blocklisted process makes network request
PID:1220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 3723⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148