Analysis
-
max time kernel
1s -
max time network
29s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 15:23
Static task
static1
Behavioral task
behavioral1
Sample
dbl_2.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dbl_2.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
dbl_2.dll
-
Size
48KB
-
MD5
12fbfb7de96e3279967af014a3e34bff
-
SHA1
72d1c283e61a93a611ca0dbe22258f292e38a293
-
SHA256
86de4f80023bdb799ab028b740ebf2f2d02f4a8d2aad47d93605920af15e41b6
-
SHA512
ec07611440ab2e219f659ee04d14d1c5f491eaa87e25cdbfb4de8fb050f30194624140bb242133942ca7c1c7574856cff79eacf7a3b5df865d720713e5bc5b5a
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1776 1696 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1776 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1696 wrote to memory of 1776 1696 rundll32.exe WerFault.exe PID 1696 wrote to memory of 1776 1696 rundll32.exe WerFault.exe PID 1696 wrote to memory of 1776 1696 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbl_2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1696 -s 562⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776