Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-05-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
bole4d.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bole4d.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
bole4d.dll
-
Size
486KB
-
MD5
1c27d92924f0cdeac60ba81ec9d8b74c
-
SHA1
263a07d97d25ac30a5db224788fad1185a2ad3f3
-
SHA256
486835ad5b265b100bdbfa99a0eba9a190db33ed31fa239fa6767a8f6bd84190
-
SHA512
f42d2050a9d30cd9e36691f6ef94319b20eb0c44bd412dbabd3f9c2f698e68b9f5bf723123eba23ac4a2fd6ad20b7b2da67b506755769bc14b19446313c317f0
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1464 1336 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1336 wrote to memory of 1464 1336 rundll32.exe WerFault.exe PID 1336 wrote to memory of 1464 1336 rundll32.exe WerFault.exe PID 1336 wrote to memory of 1464 1336 rundll32.exe WerFault.exe