Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-11-2021 16:33
Static task
static1
Behavioral task
behavioral1
Sample
6.bin.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6.bin.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
6.bin.dll
-
Size
119KB
-
MD5
9ed64dfc08c0f369e5543ef133a22fb2
-
SHA1
5732a16dffde291d8125120477133ee36cfd93e4
-
SHA256
b82a1d06e5650808ae0b9ef1a77cc6047ca0601b13a9afa8cded17a93e27cda9
-
SHA512
e2fe5b228a0623bd32953b183f1dac74ee5c016ded7686b167d2054c53cffbd2e0c3dc4ef5e2cf0e802e4565c17c3ab2cd06eaf27f24605011bad206472c8643
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1848 2820 WerFault.exe regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1848 WerFault.exe Token: SeBackupPrivilege 1848 WerFault.exe Token: SeDebugPrivilege 1848 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2768 wrote to memory of 2820 2768 regsvr32.exe regsvr32.exe PID 2768 wrote to memory of 2820 2768 regsvr32.exe regsvr32.exe PID 2768 wrote to memory of 2820 2768 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6.bin.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6.bin.dll2⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 6163⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-