Analysis
-
max time kernel
29s -
max time network
88s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-11-2020 23:00
Static task
static1
Behavioral task
behavioral1
Sample
https___purefile24.top_4352wedfoifom.php.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
https___purefile24.top_4352wedfoifom.php.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
https___purefile24.top_4352wedfoifom.php.dll
-
Size
545KB
-
MD5
e221c9a4b1ac13310d037cbc764b86d9
-
SHA1
a7dbb7283b3b164993c1c122189e42509fe5573d
-
SHA256
6b1e27915fa85d6bde40c512865e57c555e7bb02f1dc192a9b827c74c8984780
-
SHA512
56c649d6a79f68924fe55973836f51cb10bbf1ed82366ea3be9be4f8dbf8e56aa4a2aedd933fa977d2109fd9abd7ea947d77e40659f00c80f645a18580cbf12c
Score
9/10
Malware Config
Signatures
-
ServiceHost packer 5 IoCs
Detects ServiceHost packer used for .NET malware
resource yara_rule behavioral2/memory/1480-3-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1480-2-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1480-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1480-6-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1480-5-0x0000000000000000-mapping.dmp servicehost -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 1480 WerFault.exe 71 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2956 WerFault.exe Token: SeBackupPrivilege 2956 WerFault.exe Token: SeDebugPrivilege 2956 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 828 wrote to memory of 1480 828 rundll32.exe 71 PID 828 wrote to memory of 1480 828 rundll32.exe 71 PID 828 wrote to memory of 1480 828 rundll32.exe 71
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\https___purefile24.top_4352wedfoifom.php.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\https___purefile24.top_4352wedfoifom.php.dll,#12⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 6443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-