Analysis
-
max time kernel
34s -
max time network
68s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-11-2020 00:06
Static task
static1
Behavioral task
behavioral1
Sample
Dumped_Beacon_DLL_powershell_ise_exe_PIDd7c_hiddenmodule_4480000_x86.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Dumped_Beacon_DLL_powershell_ise_exe_PIDd7c_hiddenmodule_4480000_x86.dll
Resource
win10v20201028
General
-
Target
Dumped_Beacon_DLL_powershell_ise_exe_PIDd7c_hiddenmodule_4480000_x86.dll
-
Size
248KB
-
MD5
7d55a3f0151b59a1a28a8bb0519176be
-
SHA1
4dc08fc88a7c8af4557df0a0b28df5b67751c1e3
-
SHA256
0d0c1dc04c2a607e0042f4611a1b975cae82b3bb7e5e5ff912f23924ee1b88c5
-
SHA512
440fec1b76830ff35146b7ad2cc082e64e5ac39cde120849442cdf2ea265e0e5a5d107ae204cdfe367deca7d478bb46061d06530bf7983ddbde61918aecb1d0d
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2112 created 1908 2112 WerFault.exe rundll32.exe -
ServiceHost packer 6 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/1908-3-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1908-2-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1908-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1908-6-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1908-7-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1908-9-0x0000000000000000-mapping.dmp servicehost -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1084 1908 WerFault.exe rundll32.exe 2112 1908 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
WerFault.exeWerFault.exepid process 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 1084 WerFault.exe Token: SeBackupPrivilege 1084 WerFault.exe Token: SeDebugPrivilege 1084 WerFault.exe Token: SeDebugPrivilege 2112 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1344 wrote to memory of 1908 1344 rundll32.exe rundll32.exe PID 1344 wrote to memory of 1908 1344 rundll32.exe rundll32.exe PID 1344 wrote to memory of 1908 1344 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dumped_Beacon_DLL_powershell_ise_exe_PIDd7c_hiddenmodule_4480000_x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dumped_Beacon_DLL_powershell_ise_exe_PIDd7c_hiddenmodule_4480000_x86.dll,#12⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 6043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 7723⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112