Analysis
-
max time kernel
11s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-11-2020 22:37
Static task
static1
Behavioral task
behavioral1
Sample
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll
-
Size
202KB
-
MD5
c98df0fc1bae93c9a904ac4c0dde5106
-
SHA1
4c28ac10e5a9cb231a9886942bcff1647e8e3632
-
SHA256
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa
-
SHA512
d6d84a1fcecb588eb702c79b006be2929a96085152c11a5c22e18d83e19953a4647e7d092c653c1a18c6e10ed37e7e2ef86a085f21cb04ead7d63b159f113fe8
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1892 2932 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1892 WerFault.exe Token: SeBackupPrivilege 1892 WerFault.exe Token: SeDebugPrivilege 1892 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3936 wrote to memory of 2932 3936 rundll32.exe rundll32.exe PID 3936 wrote to memory of 2932 3936 rundll32.exe rundll32.exe PID 3936 wrote to memory of 2932 3936 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1892-1-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/1892-6-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/2932-0-0x0000000000000000-mapping.dmp
-
memory/2932-2-0x0000000000000000-mapping.dmp
-
memory/2932-3-0x0000000000000000-mapping.dmp
-
memory/2932-4-0x0000000000000000-mapping.dmp
-
memory/2932-5-0x0000000000000000-mapping.dmp