Analysis
-
max time kernel
136s -
max time network
192s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891.dll
Resource
win10-en-20211208
General
-
Target
e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891.dll
-
Size
164KB
-
MD5
573f1e1f73b0cf557ace69c9791a8b66
-
SHA1
d498b606684e8276c63fd9afcc1aaf2e380914f9
-
SHA256
e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891
-
SHA512
aa5374dc99beebfdf2cf7019276246141d1ff1f514267550d00ccc80e54d658a95e0fb4f4baf72630683b6f4001e3221e09bcf01ad3a0d7c970735f05822056f
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1764 created 652 1764 WerFault.exe rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1764 652 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1764 WerFault.exe Token: SeBackupPrivilege 1764 WerFault.exe Token: SeDebugPrivilege 1764 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 420 wrote to memory of 652 420 rundll32.exe rundll32.exe PID 420 wrote to memory of 652 420 rundll32.exe rundll32.exe PID 420 wrote to memory of 652 420 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e32472e54a971432d6c9352c235a33898cae97a947f0fb33f0a6613f32c05891.dll,#12⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 7443⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/652-117-0x0000000003480000-0x000000000348A000-memory.dmpFilesize
40KB
-
memory/652-118-0x0000000006410000-0x0000000006416000-memory.dmpFilesize
24KB
-
memory/652-119-0x0000000003490000-0x00000000035E6000-memory.dmpFilesize
1.3MB
-
memory/652-121-0x0000000003790000-0x0000000003791000-memory.dmpFilesize
4KB
-
memory/652-120-0x0000000003780000-0x0000000003781000-memory.dmpFilesize
4KB