Analysis
-
max time kernel
13s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 11:34
Static task
static1
Behavioral task
behavioral1
Sample
7366957065bccb45c383967ab76f1870.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7366957065bccb45c383967ab76f1870.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
7366957065bccb45c383967ab76f1870.dll
-
Size
199KB
-
MD5
dfb9e8335d8ae2f4bad70b7df64f0609
-
SHA1
1f40e079b88f86a0f00e3d6ff2c08da9984e5edf
-
SHA256
04ff43b10ed915993334153e0f45fd72312d861d89148d37cf50d6c26e04dc73
-
SHA512
0e2a3d63fcd2fc0adaf76d40110479d07a8cb2e99bcba7025998ef671a9772e530ef6a1462740715367e61108c27d0253de2e0494489eb9acc73e1fb51831a7a
Score
10/10
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
ServiceHost packer 4 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/4804-2-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4804-3-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4804-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4804-5-0x0000000000000000-mapping.dmp servicehost -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3800 4804 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3800 WerFault.exe Token: SeBackupPrivilege 3800 WerFault.exe Token: SeDebugPrivilege 3800 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4760 wrote to memory of 4804 4760 rundll32.exe rundll32.exe PID 4760 wrote to memory of 4804 4760 rundll32.exe rundll32.exe PID 4760 wrote to memory of 4804 4760 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7366957065bccb45c383967ab76f1870.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7366957065bccb45c383967ab76f1870.dll,#12⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-