Analysis
-
max time kernel
113s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-03-2021 12:50
Static task
static1
Behavioral task
behavioral1
Sample
viri.exe.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
viri.exe.dll
-
Size
37KB
-
MD5
8539346052a26e7afb4c7e4331c88448
-
SHA1
6be665d2139f14759a025543b83c4c0cbff70687
-
SHA256
492992c706bb70b10eedb7952c287ec1df35fceb32f4d050a18f51bb6e60e303
-
SHA512
4d380dbc13def50a6033498174c1fa26f74e3545701deaccab42111ea205d5592f584bf2980ea71c0260d9a67f742c2c9c64267ee73f5f2b9e169e84b69e8753
Malware Config
Signatures
-
Nloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-4-0x0000000000100000-0x0000000000109000-memory.dmp nloader behavioral1/memory/1924-5-0x0000000010000000-0x0000000010007000-memory.dmp nloader behavioral1/memory/1924-6-0x00000000001D0000-0x00000000001D5000-memory.dmp nloader behavioral1/memory/1924-7-0x00000000000F0000-0x00000000000F6000-memory.dmp nloader -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1364 1924 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1364 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1364 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1924 1108 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1364 1924 rundll32.exe WerFault.exe PID 1924 wrote to memory of 1364 1924 rundll32.exe WerFault.exe PID 1924 wrote to memory of 1364 1924 rundll32.exe WerFault.exe PID 1924 wrote to memory of 1364 1924 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\viri.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\viri.exe.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 4563⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1364