Analysis
-
max time kernel
109s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll
-
Size
3.5MB
-
MD5
c0a26edbd8e0bb5ba4e32eb3fceb250b
-
SHA1
a6dfd89164d12ffb403c57a22c65fcbe43bd873d
-
SHA256
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9
-
SHA512
de2cfeadf4b3eb2e5e2bffdf048bcdbfc67622f2befd1391407a00c07e38c0c80ce497060d70f6ce1b797012c795f515d880ceb984c82824c3c92ea7144d2695
Malware Config
Signatures
-
Detect Numando Payload 1 IoCs
resource yara_rule behavioral1/memory/360-56-0x0000000002170000-0x00000000024FF000-memory.dmp family_numando -
Blocklisted process makes network request 10 IoCs
flow pid Process 2 360 rundll32.exe 3 360 rundll32.exe 4 360 rundll32.exe 5 360 rundll32.exe 6 360 rundll32.exe 8 360 rundll32.exe 9 360 rundll32.exe 10 360 rundll32.exe 11 360 rundll32.exe 12 360 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2020 360 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 800 wrote to memory of 360 800 rundll32.exe 27 PID 360 wrote to memory of 2020 360 rundll32.exe 28 PID 360 wrote to memory of 2020 360 rundll32.exe 28 PID 360 wrote to memory of 2020 360 rundll32.exe 28 PID 360 wrote to memory of 2020 360 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 360 -s 4323⤵
- Program crash
PID:2020
-
-