Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll
-
Size
3.5MB
-
MD5
c0a26edbd8e0bb5ba4e32eb3fceb250b
-
SHA1
a6dfd89164d12ffb403c57a22c65fcbe43bd873d
-
SHA256
cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9
-
SHA512
de2cfeadf4b3eb2e5e2bffdf048bcdbfc67622f2befd1391407a00c07e38c0c80ce497060d70f6ce1b797012c795f515d880ceb984c82824c3c92ea7144d2695
Malware Config
Signatures
-
Detect Numando Payload 1 IoCs
resource yara_rule behavioral2/memory/1012-131-0x0000000002AA0000-0x0000000002E2F000-memory.dmp family_numando -
Blocklisted process makes network request 10 IoCs
flow pid Process 6 1012 rundll32.exe 27 1012 rundll32.exe 35 1012 rundll32.exe 47 1012 rundll32.exe 54 1012 rundll32.exe 60 1012 rundll32.exe 62 1012 rundll32.exe 65 1012 rundll32.exe 71 1012 rundll32.exe 72 1012 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 1012 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1012 2252 rundll32.exe 81 PID 2252 wrote to memory of 1012 2252 rundll32.exe 81 PID 2252 wrote to memory of 1012 2252 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdf4b776599edc5640c53c2ecdf0959b24d49245e6fae4d1ec57c03cf3660ae9.dll,#12⤵
- Blocklisted process makes network request
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 8203⤵
- Program crash
PID:4536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1012 -ip 10121⤵PID:3632