Analysis
-
max time kernel
125s -
max time network
133s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 11:21
Static task
static1
Behavioral task
behavioral1
Sample
488e8b7aa492b544a17dca68991cea92.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
488e8b7aa492b544a17dca68991cea92.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
488e8b7aa492b544a17dca68991cea92.dll
-
Size
256KB
-
MD5
ef0b3dcbf6a9237a12e3f93edff4f84c
-
SHA1
7890e5939709fd1b4fc11933ec612187ba6de445
-
SHA256
82f5ee1bdfa56249538cc73017655a380a0eadb6b812fd7e6fd05bc43d647fad
-
SHA512
c2e30677655049da35e84406446d24d5d03ee59f91bcb6da299cb0a8a087625e9ec0c360659bb8311997bc617b9da21afd3c1c15be0adf335bac0ce62980a9b7
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2012 1632 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 2012 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1632 wrote to memory of 2012 1632 rundll32.exe WerFault.exe PID 1632 wrote to memory of 2012 1632 rundll32.exe WerFault.exe PID 1632 wrote to memory of 2012 1632 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\488e8b7aa492b544a17dca68991cea92.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1632 -s 1082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-