Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-11-2020 23:15
Static task
static1
Behavioral task
behavioral1
Sample
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll
-
Size
199KB
-
MD5
5d0bbc4db7f2771b87c4aa5389381a3a
-
SHA1
82a9e68b18f84c31b71cecbdf1f983067b70ec06
-
SHA256
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538
-
SHA512
797052afcefd402423b9112aa968eaf9b7c2998f525ad9347ee86f4d0c8336f5f52ce9c5ba2a5c3bebe1b142fdc47b141414a0125e8e2fe1d3a285122bbb20a3
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2016 1920 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 2016 WerFault.exe 2016 WerFault.exe 2016 WerFault.exe 2016 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 2016 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 344 wrote to memory of 1920 344 rundll32.exe rundll32.exe PID 1920 wrote to memory of 2016 1920 rundll32.exe WerFault.exe PID 1920 wrote to memory of 2016 1920 rundll32.exe WerFault.exe PID 1920 wrote to memory of 2016 1920 rundll32.exe WerFault.exe PID 1920 wrote to memory of 2016 1920 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 2443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-