Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-10-2021 13:08
Behavioral task
behavioral1
Sample
6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762.dll
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762.dll
-
Size
660KB
-
MD5
30a9ce4f105dd8f39d61736217b772d7
-
SHA1
cd3f75d28816b5c08407c3e418e9bb780c9a41b1
-
SHA256
6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762
-
SHA512
23a9dabed1b16b200e34b6717ac54c3c9da371c90b2e51e1be77de6901cea418ceaaac39c82d11dce4d0fc192d343c8383e55b356ee3c39f27c05d133727cb91
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 780 2996 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe 780 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 780 WerFault.exe Token: SeBackupPrivilege 780 WerFault.exe Token: SeDebugPrivilege 780 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 776 wrote to memory of 2996 776 rundll32.exe rundll32.exe PID 776 wrote to memory of 2996 776 rundll32.exe rundll32.exe PID 776 wrote to memory of 2996 776 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6460f606f563d1fe3c74b215e1252dc7466322e4d2b55b898b9da1bd63454762.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 6163⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2996-114-0x0000000000000000-mapping.dmp