Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    07-02-2022 14:19

General

  • Target

    1172-56-0x00000000001A0000-0x00000000001AA000-memory.dll

  • Size

    40KB

  • MD5

    53457fa357f45ba219467afdf28c2afe

  • SHA1

    4e3e707c802fc647530171949ec8c8794326fd6a

  • SHA256

    c9f4e72bfeaf8893313679bec867f28cc66e6993956c7c1eacbd6000ff4d89fe

  • SHA512

    e9b2ef36b20353bc2688b38142f3e0364c9f8403a7bf3eb65aa1f54a386de659dfefb4410f775f33e14685759224f8819e64dd2a82d3175173fd34636fb89405

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1172-56-0x00000000001A0000-0x00000000001AA000-memory.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 840 -s 56
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1404-54-0x000007FEFC511000-0x000007FEFC513000-memory.dmp

    Filesize

    8KB

  • memory/1404-55-0x0000000001B80000-0x0000000001B81000-memory.dmp

    Filesize

    4KB