Analysis

  • max time kernel
    17s
  • max time network
    104s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-11-2020 22:37

General

  • Target

    8b551d934c77bb89d63071b22d33596b6655f4f2d4b4efaee5482112ba6868fa.dll

  • Size

    256KB

  • MD5

    b0638f42f4b0f3193c34708030ece341

  • SHA1

    2137dc9feee21992e282edc0a87a207ce3ab886c

  • SHA256

    8b551d934c77bb89d63071b22d33596b6655f4f2d4b4efaee5482112ba6868fa

  • SHA512

    2911fe40f49a9d29153146a4480cc1aa92d11790e44450c1af4140666cb0fa164e48e8ec2e4a96172f16f7ea76f1209696aeba321256fe4397f460e1fb3a3915

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8b551d934c77bb89d63071b22d33596b6655f4f2d4b4efaee5482112ba6868fa.dll,#1
    1⤵
      PID:4756
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4756 -s 292
        2⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5044

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5044-0-0x000001C28BB90000-0x000001C28BB91000-memory.dmp
      Filesize

      4KB

    • memory/5044-1-0x000001C28C900000-0x000001C28C901000-memory.dmp
      Filesize

      4KB

    • memory/5044-2-0x000001C28C900000-0x000001C28C901000-memory.dmp
      Filesize

      4KB

    • memory/5044-3-0x000001C28C900000-0x000001C28C901000-memory.dmp
      Filesize

      4KB