Analysis
-
max time kernel
17s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 10:51
Static task
static1
Behavioral task
behavioral1
Sample
39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll
Resource
win10v20201028
General
-
Target
39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll
-
Size
206KB
-
MD5
dd46c5fd32f4576d9575b79797c64c45
-
SHA1
3b6b6ce3118fc4db4815d0c6b8c4f66d46ea2e25
-
SHA256
39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85
-
SHA512
dec68404f985337d8d2f77c871beb2afb6239f521d91af1681cd5453ee9e9cc72fe8c7b63ff2b812abd5666801ccb0c98bea0384344e85646a4020515621aaf6
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3080 4816 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3080 WerFault.exe Token: SeBackupPrivilege 3080 WerFault.exe Token: SeDebugPrivilege 3080 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4756 wrote to memory of 4816 4756 rundll32.exe rundll32.exe PID 4756 wrote to memory of 4816 4756 rundll32.exe rundll32.exe PID 4756 wrote to memory of 4816 4756 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll,#12⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080