Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
13-11-2021 17:36
Static task
static1
Behavioral task
behavioral1
Sample
c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d.dll
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d.dll
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d.dll
-
Size
68KB
-
MD5
5f5aed43a3ee55f2727f1c1470a6db32
-
SHA1
7574a3cb7c27bd548e93309b0401e7ce48d22d76
-
SHA256
c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d
-
SHA512
a3912fb654538c73c57c9a60b8a67e60b2446f1c5824d068613722a576bdcd26ef8ea121ffb4831b140049cecafd49e6879426dab7312c9e7a7283e9ebd4ae7f
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3276 created 676 3276 WerFault.exe 68 -
Program crash 1 IoCs
pid pid_target Process procid_target 3276 676 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3276 WerFault.exe Token: SeBackupPrivilege 3276 WerFault.exe Token: SeDebugPrivilege 3276 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 676 3156 rundll32.exe 68 PID 3156 wrote to memory of 676 3156 rundll32.exe 68 PID 3156 wrote to memory of 676 3156 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c88f8d086be8dd345babad15c76490ef889af7eaecb015f3107ff039f0ed5f2d.dll,#12⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 5803⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-