Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-12-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
core.bat
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
entry-64.tmp.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
entry-64.tmp.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
entry-64.tmp.dll
-
Size
160KB
-
MD5
d6444f52777f52f5a18dfa8d30fe8ce2
-
SHA1
68be9b3164b7b7f133bb0242b77e88b04bc03b08
-
SHA256
6c358edb2a4ffa59ffcd066960f937db7f95cf646ea2792bc5efbe8b3072dae7
-
SHA512
f5d6ee66748d9d51cab0b3e85a451dcaccdbee04eb31e5dcd6f019a3f08b4818134d5c0d41dd2991c152a6292d34e81495d19dbd5eb51da16ecb60def5625179
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 356 created 3772 356 WerFault.exe rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 356 3772 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 356 WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\entry-64.tmp.dll,#11⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3772 -s 3762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3772-118-0x00007FF75CD30000-0x00007FF75CD35000-memory.dmpFilesize
20KB