Analysis
-
max time kernel
3s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-11-2020 22:50
Static task
static1
Behavioral task
behavioral1
Sample
ecbf82ef4e11ff9f67070d9d27eacc8080fe0baad57d7acc4dc7b417f546ea67.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ecbf82ef4e11ff9f67070d9d27eacc8080fe0baad57d7acc4dc7b417f546ea67.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ecbf82ef4e11ff9f67070d9d27eacc8080fe0baad57d7acc4dc7b417f546ea67.dll
-
Size
304KB
-
MD5
11272013e71815b815f3b8f20c49006d
-
SHA1
fa1a97c644b26d2b3e104d4eea27f73806153f47
-
SHA256
ecbf82ef4e11ff9f67070d9d27eacc8080fe0baad57d7acc4dc7b417f546ea67
-
SHA512
50fe98e496f51467f2126da916bf3349f44c62cfff0cb13fe07a419a13c272bb84b2d39987a27e4028b2054132e3de63babb04149192f678feab3fba5925755e
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1948 1320 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1948 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1320 wrote to memory of 1948 1320 rundll32.exe WerFault.exe PID 1320 wrote to memory of 1948 1320 rundll32.exe WerFault.exe PID 1320 wrote to memory of 1948 1320 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecbf82ef4e11ff9f67070d9d27eacc8080fe0baad57d7acc4dc7b417f546ea67.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1320 -s 562⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-