Overview
overview
10Static
static
104bd/472-84...mp.dll
windows7_x64
34bd/472-84...mp.dll
windows10_x64
34bd/Attach...ng.lnk
windows7_x64
84bd/Attach...ng.lnk
windows10_x64
8Attachment.png.lnk
windows7_x64
8Attachment.png.lnk
windows10_x64
8work.ps1
windows7_x64
8work.ps1
windows10_x64
84bd/ldr.dat.ps1
windows7_x64
104bd/ldr.dat.ps1
windows10_x64
14bd/work.ps1
windows7_x64
84bd/work.ps1
windows10_x64
8Analysis
-
max time kernel
9s -
max time network
16s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
25-08-2021 20:27
Static task
static1
Behavioral task
behavioral1
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win10v20210410
Behavioral task
behavioral3
Sample
4bd/Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral4
Sample
4bd/Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral6
Sample
Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral7
Sample
work.ps1
Resource
win7v20210410
Behavioral task
behavioral8
Sample
work.ps1
Resource
win10v20210408
Behavioral task
behavioral9
Sample
4bd/ldr.dat.ps1
Resource
win7v20210410
Behavioral task
behavioral10
Sample
4bd/ldr.dat.ps1
Resource
win10v20210408
Behavioral task
behavioral11
Sample
4bd/work.ps1
Resource
win7v20210410
Behavioral task
behavioral12
Sample
4bd/work.ps1
Resource
win10v20210408
General
-
Target
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
-
Size
36KB
-
MD5
b4eec11177d284bc32c20a06d0ab43fb
-
SHA1
1d28dcb836ea4727dd05372e7996ef6e25bd8fca
-
SHA256
b13ffaca4d87176cf54c5f567d24f8e509c78681c9cf55d8189936611dd58671
-
SHA512
789cc0437d7ba500faa3db9619aa4c8f627040d5405b796f21c1122212671773eeecadedcded16112e2961de9cb220226880c161bba153db438c6f69258af01b
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1280 1840 WerFault.exe 24 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1280 WerFault.exe 1280 WerFault.exe 1280 WerFault.exe 1280 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1280 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1280 1840 rundll32.exe 25 PID 1840 wrote to memory of 1280 1840 rundll32.exe 25 PID 1840 wrote to memory of 1280 1840 rundll32.exe 25
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bd\472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1840 -s 1682⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-