Analysis
-
max time kernel
51s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 11:22
Static task
static1
Behavioral task
behavioral1
Sample
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll
-
Size
507KB
-
MD5
b916ccb2a2bf0381133e5b8ef9782e1f
-
SHA1
4a740790a645000119070122c710e1bac020bd25
-
SHA256
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
SHA512
04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
ServiceHost packer 6 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/4052-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4052-6-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4052-5-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4052-7-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4052-8-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/4052-9-0x0000000000000000-mapping.dmp servicehost -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2680 4052 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2680 WerFault.exe Token: SeBackupPrivilege 2680 WerFault.exe Token: SeDebugPrivilege 2680 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4076 wrote to memory of 4052 4076 rundll32.exe rundll32.exe PID 4076 wrote to memory of 4052 4076 rundll32.exe rundll32.exe PID 4076 wrote to memory of 4052 4076 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#12⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 6443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-