Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:27
Static task
static1
Behavioral task
behavioral1
Sample
file.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
file.dll
-
Size
164KB
-
MD5
8afd4dcef4e3dcef755ecb2a996959ea
-
SHA1
803e092fe8612172bdad5111c7f783e81d55ed7b
-
SHA256
747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519
-
SHA512
27724aa4f1c4ec52fd56b4422bcaa5dfe73ecbe1a2f174c3695923e1717f831e32e6349b1c37848788ce6d8e22f4bda9ee73aab1df2a794eeda13b81f46610a9
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2080 created 808 2080 WerFault.exe rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2080 808 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2080 WerFault.exe Token: SeBackupPrivilege 2080 WerFault.exe Token: SeDebugPrivilege 2080 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 424 wrote to memory of 808 424 rundll32.exe rundll32.exe PID 424 wrote to memory of 808 424 rundll32.exe rundll32.exe PID 424 wrote to memory of 808 424 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 7523⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/808-0-0x0000000000000000-mapping.dmp
-
memory/808-3-0x0000000000000000-mapping.dmp
-
memory/808-4-0x0000000000000000-mapping.dmp
-
memory/808-5-0x0000000000000000-mapping.dmp
-
memory/808-2-0x0000000000000000-mapping.dmp
-
memory/808-7-0x0000000000000000-mapping.dmp
-
memory/808-6-0x0000000000000000-mapping.dmp
-
memory/808-8-0x0000000000000000-mapping.dmp
-
memory/2080-1-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/2080-9-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB