Analysis

  • max time kernel
    157s
  • max time network
    169s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:26

General

  • Target

    1e1589de70ea7ebad976aa1c1ebdb32e0695ee268aa5f7f8ac834ed3960a4803.dll

  • Size

    164KB

  • MD5

    6bf8720c0741f11219f38e747392b73e

  • SHA1

    73030215c499f6908f418266bc1c522fdc2462df

  • SHA256

    1e1589de70ea7ebad976aa1c1ebdb32e0695ee268aa5f7f8ac834ed3960a4803

  • SHA512

    b90e78c1e011ac347b9fd86e6415312a242854f84a1a0956c513333819a6bba773e5ec74afaeaf374c05410a88bb54d22f48c1de7682e21a9bd961387c62379e

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e1589de70ea7ebad976aa1c1ebdb32e0695ee268aa5f7f8ac834ed3960a4803.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e1589de70ea7ebad976aa1c1ebdb32e0695ee268aa5f7f8ac834ed3960a4803.dll,#1
      2⤵
        PID:4100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 784
          3⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4100-119-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/4100-118-0x0000000003660000-0x000000000366A000-memory.dmp
      Filesize

      40KB

    • memory/4100-120-0x0000000004EB0000-0x0000000004ED3000-memory.dmp
      Filesize

      140KB

    • memory/4100-121-0x0000000004EE0000-0x0000000004F03000-memory.dmp
      Filesize

      140KB

    • memory/4100-122-0x0000000004F10000-0x0000000004F16000-memory.dmp
      Filesize

      24KB