Analysis
-
max time kernel
20s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-11-2020 08:29
Static task
static1
Behavioral task
behavioral1
Sample
0pz1on1.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
0pz1on1.dll
-
Size
539KB
-
MD5
3bd94cd9d5af80967956a0c2789bf180
-
SHA1
7d0b946bfa133ec9c10cb1cca0007139597b2011
-
SHA256
e9b8536f66aa5222f1979fea40b25b83f2acb487a0ab61a76378a2128efc0420
-
SHA512
610e44c03c8a7ec8a59825a32ec349576474abd4888aed3efcf89799c020b53d89d4ab0309aa78452bbdf9f7b2fe463c312d8c18e2901d8335c4df02df73cddc
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 200 3880 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe 200 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 200 WerFault.exe Token: SeBackupPrivilege 200 WerFault.exe Token: SeDebugPrivilege 200 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3880 2868 rundll32.exe 69 PID 2868 wrote to memory of 3880 2868 rundll32.exe 69 PID 2868 wrote to memory of 3880 2868 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0pz1on1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0pz1on1.dll,#12⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6123⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-