Analysis
-
max time kernel
3s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:31
Static task
static1
Behavioral task
behavioral1
Sample
BNB3A6Z7APWN48Y8BIV1KLP0U4H5ZF7I2AVUE.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BNB3A6Z7APWN48Y8BIV1KLP0U4H5ZF7I2AVUE.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
NRYX8S2Y6INF3MRG1PQMFG24PUFNA7.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
NRYX8S2Y6INF3MRG1PQMFG24PUFNA7.exe
Resource
win10v2004-20220414-en
General
-
Target
BNB3A6Z7APWN48Y8BIV1KLP0U4H5ZF7I2AVUE.dll
-
Size
9.7MB
-
MD5
1cef96e373cd8641b51a5a48b35fd9d5
-
SHA1
ac31b4426799cb5755f76ad13b0d999bc0299cce
-
SHA256
eb075068d9f815936687ef1fddc320bcdfb68842e13d98faccaef555cb7500ce
-
SHA512
6e4858ef15806ecb325981571bfe3fc3edaae738623257684439ae627268d8abd8105aae6705fc65a4117d03498ca2708eaade405ce7b9b89a6904eff70d26ed
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1936 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 1936 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 rundll32.exe 1936 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 2012 wrote to memory of 1936 2012 rundll32.exe 28 PID 1936 wrote to memory of 1152 1936 rundll32.exe 29 PID 1936 wrote to memory of 1152 1936 rundll32.exe 29 PID 1936 wrote to memory of 1152 1936 rundll32.exe 29 PID 1936 wrote to memory of 1152 1936 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\BNB3A6Z7APWN48Y8BIV1KLP0U4H5ZF7I2AVUE.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\BNB3A6Z7APWN48Y8BIV1KLP0U4H5ZF7I2AVUE.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 3003⤵
- Program crash
PID:1152
-
-