Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:56
Static task
static1
Behavioral task
behavioral1
Sample
d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51.dll
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51.dll
-
Size
164KB
-
MD5
7d202172c49d60aa1847d90bd284114f
-
SHA1
1cab5eedcd7390806332a2f25d264e79395e1005
-
SHA256
d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51
-
SHA512
a4cc0b5645d44d13fab043b20602dc9730d36825f75df19743f1d26821dd1c5a7f86d4f2470702d46368032db72a3087484afff768ba7a3441029f75d91b5dfb
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1084 1452 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe PID 1448 wrote to memory of 1452 1448 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7a15f872a64811b74f40992df2f45f7f800ee88775e50cc0ab02d7d9247de51.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 2963⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1452-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmpFilesize
8KB