Analysis

  • max time kernel
    41s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    30-03-2021 11:37

General

  • Target

    971b2ad87ced696d68e9476f746735096bf22656331b7bdf3b3f325c2ae1950a.dll

  • Size

    8.3MB

  • MD5

    3ada446f10c2dc41e0e15d698b651db2

  • SHA1

    3fbe80c5ea88f96eae4cddc0f69d61c5b0b04a64

  • SHA256

    971b2ad87ced696d68e9476f746735096bf22656331b7bdf3b3f325c2ae1950a

  • SHA512

    0d6b9ecaa1b3ca82e7e2f9ce03a5bb3d876a4c1b8b4c6fa65f3f5566c05b6a2c19af7c85398a9ada7c0da0535f7439cad719c52d3ab5e54858ed4a25bd825a67

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\971b2ad87ced696d68e9476f746735096bf22656331b7bdf3b3f325c2ae1950a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\971b2ad87ced696d68e9476f746735096bf22656331b7bdf3b3f325c2ae1950a.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 196
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1288-2-0x0000000000000000-mapping.dmp
  • memory/1288-3-0x0000000076241000-0x0000000076243000-memory.dmp
    Filesize

    8KB

  • memory/1996-4-0x0000000000000000-mapping.dmp
  • memory/1996-5-0x0000000001E20000-0x0000000001E31000-memory.dmp
    Filesize

    68KB

  • memory/1996-6-0x0000000000480000-0x0000000000481000-memory.dmp
    Filesize

    4KB