Analysis
-
max time kernel
3s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 11:38
Static task
static1
Behavioral task
behavioral1
Sample
3d9524ca28621882a394bfde868ad792.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3d9524ca28621882a394bfde868ad792.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
3d9524ca28621882a394bfde868ad792.dll
-
Size
256KB
-
MD5
0cd5d2783e1d3616131a4652c48cc446
-
SHA1
5be5371a5ae726651eeecc8e456d14f1f5810a8c
-
SHA256
37ce7d835f59a54c32c49157918cfcd5c77e7f3923f4a2c7ac9d7fcc97f15ac7
-
SHA512
7b499113bba8efd46b425279b76946b5ec62a87ade84405ceda238d1251bf52ab344354040644785689c953a21d4add199b3998e121b830a3d03246501ce27cb
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1324 1892 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1324 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1892 wrote to memory of 1324 1892 rundll32.exe WerFault.exe PID 1892 wrote to memory of 1324 1892 rundll32.exe WerFault.exe PID 1892 wrote to memory of 1324 1892 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d9524ca28621882a394bfde868ad792.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1892 -s 1082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-