Analysis
-
max time kernel
134s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
6729be401eb23017b85c357194720ed8aac2c65d470ff74505d9bd9068eaad0d.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
6729be401eb23017b85c357194720ed8aac2c65d470ff74505d9bd9068eaad0d.dll
-
Size
8.4MB
-
MD5
c243e95112cf3f78a08b10746279049e
-
SHA1
2bd84db1ceb13c6a47de90d95d07ffda75ecbaf5
-
SHA256
6729be401eb23017b85c357194720ed8aac2c65d470ff74505d9bd9068eaad0d
-
SHA512
1327b201c80859dc8e83cbf9db576c95a2ddcd2966253cd80d1b474c7b8166c91ab66ce08974d2233d594a632bdfc3febc93e12697aae0e49e3348d1e3e30830
Malware Config
Signatures
-
Detect Numando Payload 2 IoCs
resource yara_rule behavioral2/memory/1044-138-0x0000000002320000-0x0000000003457000-memory.dmp family_numando behavioral2/memory/1044-140-0x0000000002320000-0x0000000003457000-memory.dmp family_numando -
resource yara_rule behavioral2/memory/1044-131-0x0000000002320000-0x0000000003457000-memory.dmp vmprotect behavioral2/memory/1044-138-0x0000000002320000-0x0000000003457000-memory.dmp vmprotect behavioral2/memory/1044-140-0x0000000002320000-0x0000000003457000-memory.dmp vmprotect -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 1044 WerFault.exe 78 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1044 rundll32.exe 1044 rundll32.exe 1044 rundll32.exe 1044 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 664 wrote to memory of 1044 664 rundll32.exe 78 PID 664 wrote to memory of 1044 664 rundll32.exe 78 PID 664 wrote to memory of 1044 664 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6729be401eb23017b85c357194720ed8aac2c65d470ff74505d9bd9068eaad0d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6729be401eb23017b85c357194720ed8aac2c65d470ff74505d9bd9068eaad0d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 7003⤵
- Program crash
PID:2032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1044 -ip 10441⤵PID:1852