Analysis
-
max time kernel
16s -
max time network
66s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-03-2021 12:50
Static task
static1
Behavioral task
behavioral1
Sample
viri.exe.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
viri.exe.dll
-
Size
37KB
-
MD5
8539346052a26e7afb4c7e4331c88448
-
SHA1
6be665d2139f14759a025543b83c4c0cbff70687
-
SHA256
492992c706bb70b10eedb7952c287ec1df35fceb32f4d050a18f51bb6e60e303
-
SHA512
4d380dbc13def50a6033498174c1fa26f74e3545701deaccab42111ea205d5592f584bf2980ea71c0260d9a67f742c2c9c64267ee73f5f2b9e169e84b69e8753
Malware Config
Signatures
-
Nloader Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1760-3-0x0000000002F30000-0x0000000002F39000-memory.dmp nloader behavioral2/memory/1760-4-0x0000000010000000-0x0000000010007000-memory.dmp nloader behavioral2/memory/1760-5-0x0000000002F60000-0x0000000002F65000-memory.dmp nloader behavioral2/memory/1760-6-0x0000000002F20000-0x0000000002F26000-memory.dmp nloader -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2092 1760 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2092 WerFault.exe Token: SeBackupPrivilege 2092 WerFault.exe Token: SeDebugPrivilege 2092 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1048 wrote to memory of 1760 1048 rundll32.exe rundll32.exe PID 1048 wrote to memory of 1760 1048 rundll32.exe rundll32.exe PID 1048 wrote to memory of 1760 1048 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\viri.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\viri.exe.dll,#12⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 8683⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092