Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:41
Static task
static1
Behavioral task
behavioral1
Sample
5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e.dll
-
Size
204KB
-
MD5
ec433968595870cc34036c6f15d76a98
-
SHA1
c078bddc922dc829a472d0f061f349c36935438e
-
SHA256
5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e
-
SHA512
ad90255b68e5e352ec1e1b26a4bc16aac2964816bad013ff2ba0ce6dc4e8bd9e364fd93995f1fec2bb015bbfc61f74c2032b8d8010db6c1052b2bebe636fa599
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1788 1044 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 1044 1672 rundll32.exe rundll32.exe PID 1044 wrote to memory of 1788 1044 rundll32.exe WerFault.exe PID 1044 wrote to memory of 1788 1044 rundll32.exe WerFault.exe PID 1044 wrote to memory of 1788 1044 rundll32.exe WerFault.exe PID 1044 wrote to memory of 1788 1044 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b6efbc8b828f8e00480b79a9d49e623a191638c3b2b58848d20b43f641bdd8e.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2323⤵
- Program crash