Analysis
-
max time kernel
32s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-03-2021 05:32
Static task
static1
Behavioral task
behavioral1
Sample
sgm.bin.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
sgm.bin.dll
-
Size
40KB
-
MD5
8a9a8739404210e7e454dc2466872f23
-
SHA1
a3dbb6cb1eed87147f734c933e087bd66954ca18
-
SHA256
8229a6d0339c001fd0ce51db1b10748d37c838baee130afea2488f2ad0e05ac4
-
SHA512
2479c99ffc4002c909a1e6acf66ed2b6dc32efeea0b6182eb2ca8bb5cbe65bd85e507a0bab5f1e38232918cf59f29b592dc1f83b4d9684106ebf5707e057726e
Malware Config
Signatures
-
Nloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-5-0x0000000010000000-0x0000000010007000-memory.dmp nloader behavioral1/memory/1668-4-0x0000000000170000-0x0000000000179000-memory.dmp nloader behavioral1/memory/1668-8-0x0000000000160000-0x0000000000167000-memory.dmp nloader -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 1916 1668 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1916 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1668 1724 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1916 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1916 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1916 1668 rundll32.exe WerFault.exe PID 1668 wrote to memory of 1916 1668 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sgm.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sgm.bin.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 3321⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916