Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-02-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
22585ab7de35b08fde0936704c556c39f0e0d554a4522c01ec8c16777ba7bd6f.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
22585ab7de35b08fde0936704c556c39f0e0d554a4522c01ec8c16777ba7bd6f.dll
-
Size
10.6MB
-
MD5
2895127494f4f2c45357dfae7dda9ec6
-
SHA1
29821030519227db7fa3c37db36b213f1c6f0a0a
-
SHA256
22585ab7de35b08fde0936704c556c39f0e0d554a4522c01ec8c16777ba7bd6f
-
SHA512
2a837fe1cb0a8f0a57d997f82c1f6a42704deaba07f4ec94c2e2d60743b40dc6196a251290a191f4746cc8d67cc36695e9c4c64c795591a40406701296540f42
Malware Config
Signatures
-
Detect Numando Payload 2 IoCs
resource yara_rule behavioral2/memory/4608-136-0x00000000021A0000-0x0000000003768000-memory.dmp family_numando behavioral2/memory/4608-139-0x00000000021A1000-0x0000000002525000-memory.dmp family_numando -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2404 created 4608 2404 WerFault.exe 82 -
resource yara_rule behavioral2/memory/4608-136-0x00000000021A0000-0x0000000003768000-memory.dmp vmprotect -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4556 4608 WerFault.exe 82 1972 4608 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 rundll32.exe 4608 rundll32.exe 4608 rundll32.exe 4608 rundll32.exe 4556 WerFault.exe 4556 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 4556 WerFault.exe Token: SeBackupPrivilege 4556 WerFault.exe Token: SeShutdownPrivilege 2152 svchost.exe Token: SeCreatePagefilePrivilege 2152 svchost.exe Token: SeShutdownPrivilege 2152 svchost.exe Token: SeCreatePagefilePrivilege 2152 svchost.exe Token: SeShutdownPrivilege 2152 svchost.exe Token: SeCreatePagefilePrivilege 2152 svchost.exe Token: SeSecurityPrivilege 1992 TiWorker.exe Token: SeRestorePrivilege 1992 TiWorker.exe Token: SeBackupPrivilege 1992 TiWorker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4608 4716 rundll32.exe 82 PID 4716 wrote to memory of 4608 4716 rundll32.exe 82 PID 4716 wrote to memory of 4608 4716 rundll32.exe 82 PID 4608 wrote to memory of 4556 4608 rundll32.exe 91 PID 4608 wrote to memory of 4556 4608 rundll32.exe 91 PID 4608 wrote to memory of 4556 4608 rundll32.exe 91 PID 2404 wrote to memory of 4608 2404 WerFault.exe 82 PID 2404 wrote to memory of 4608 2404 WerFault.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22585ab7de35b08fde0936704c556c39f0e0d554a4522c01ec8c16777ba7bd6f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22585ab7de35b08fde0936704c556c39f0e0d554a4522c01ec8c16777ba7bd6f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7243⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7243⤵
- Program crash
PID:1972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4608 -ip 46081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1992