Analysis
-
max time kernel
7s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 11:30
Static task
static1
Behavioral task
behavioral1
Sample
46f46ade0fd2e8441d58fc443e158412.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
46f46ade0fd2e8441d58fc443e158412.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
46f46ade0fd2e8441d58fc443e158412.dll
-
Size
199KB
-
MD5
d854021f9aff7c142c26edaffdbdf825
-
SHA1
7a548811302f4c82e957c37f0116a2a10e2213d9
-
SHA256
6c3948e45a735227adf165e782b7ddfccf4b2547f44b08c5e5f9ee443f348cf2
-
SHA512
0f1a5f8ede3530549a88f4d51fd7ab896f7ee793b192e3494e3f66fe879022aae15ad31310e69d9f5ce36d89823bf4674e0e59f9e7a2cc8606703a242c9ac58f
Score
10/10
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1340 1116 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1340 WerFault.exe 1340 WerFault.exe 1340 WerFault.exe 1340 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1340 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1816 wrote to memory of 1116 1816 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1340 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1340 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1340 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1340 1116 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46f46ade0fd2e8441d58fc443e158412.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46f46ade0fd2e8441d58fc443e158412.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 2243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-