Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 11:54
Static task
static1
Behavioral task
behavioral1
Sample
8323642eddd9f2fc8dd4c29daa8c0538.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8323642eddd9f2fc8dd4c29daa8c0538.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
8323642eddd9f2fc8dd4c29daa8c0538.dll
-
Size
256KB
-
MD5
7db2604c11d6941f3b7091da1349d756
-
SHA1
8a9bf767a845ea1fb28b2df436d6ac789b62355e
-
SHA256
45b4b25fc4fe7b28e9e03936858a708d395d574962bc7ededa347a120120e656
-
SHA512
5b3b5f5c99f09146fce25d6bba4e465f89b3901aa190c3a97859ef07223e4359795339f20aec0d2f2eea4026edd71854ffd391bc0d8fa546a7baeb2d73e16c16
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1296 1880 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1296 WerFault.exe 1296 WerFault.exe 1296 WerFault.exe 1296 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1296 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1880 wrote to memory of 1296 1880 rundll32.exe WerFault.exe PID 1880 wrote to memory of 1296 1880 rundll32.exe WerFault.exe PID 1880 wrote to memory of 1296 1880 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8323642eddd9f2fc8dd4c29daa8c0538.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1880 -s 1082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-