Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 10:58
Static task
static1
Behavioral task
behavioral1
Sample
7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473.dll
-
Size
244KB
-
MD5
c43e96dd9a20b43c8a39fdf7192506b1
-
SHA1
8156bc2d3dc06c8e5e88d5b5bfdb215e4310a482
-
SHA256
7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473
-
SHA512
77b369b161b615adfedec75fce2e0d2abc148ab41d2a20e92859976ad514bab20b6be7f579a9d2ef75309b1ca25a5a94e55c1f5339fda6f695fe8be738f63fe9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1120 736 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe 1120 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1120 WerFault.exe Token: SeBackupPrivilege 1120 WerFault.exe Token: SeDebugPrivilege 1120 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 984 wrote to memory of 736 984 rundll32.exe rundll32.exe PID 984 wrote to memory of 736 984 rundll32.exe rundll32.exe PID 984 wrote to memory of 736 984 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7654260af55ece2834e4b6c1a0a7d27185eb0b5bdb44e296a0e32c95fc381473.dll,#12⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6083⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/736-0-0x0000000000000000-mapping.dmp
-
memory/736-2-0x0000000000000000-mapping.dmp
-
memory/736-3-0x0000000000000000-mapping.dmp
-
memory/736-4-0x0000000000000000-mapping.dmp
-
memory/736-6-0x0000000000000000-mapping.dmp
-
memory/736-7-0x0000000000000000-mapping.dmp
-
memory/1120-1-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/1120-5-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB