Analysis

  • max time kernel
    3s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-11-2020 22:46

General

  • Target

    1fdcf7204710c6f9e870914d6e692b2b748310a5c5ef1795ef0b3bfa003d44a2.dll

  • Size

    202KB

  • MD5

    4365a73b7ddbdff6e25bfcbb3778918b

  • SHA1

    5bb622f8e35dcad4bf939884b5e62a76f4cebfc1

  • SHA256

    1fdcf7204710c6f9e870914d6e692b2b748310a5c5ef1795ef0b3bfa003d44a2

  • SHA512

    0bac9b01bd02336b0d9e72dc75a2ec374cd41a4e40f3566a35002ab968cbc230afaeac8a32a43768288a8698ba3769bb3e457e22271bb0f86bdfc5fa2b8007d8

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1fdcf7204710c6f9e870914d6e692b2b748310a5c5ef1795ef0b3bfa003d44a2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1fdcf7204710c6f9e870914d6e692b2b748310a5c5ef1795ef0b3bfa003d44a2.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 244
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-0-0x0000000000000000-mapping.dmp
  • memory/1860-3-0x0000000000000000-mapping.dmp
  • memory/2040-1-0x0000000000000000-mapping.dmp
  • memory/2040-2-0x0000000000870000-0x0000000000881000-memory.dmp
    Filesize

    68KB

  • memory/2040-4-0x0000000002750000-0x0000000002761000-memory.dmp
    Filesize

    68KB