Analysis
-
max time kernel
90s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447.dll
-
Size
204KB
-
MD5
3de03a50dd50f8d6b4b25fa043afba43
-
SHA1
392a02512dda9e4451345960776bb90d33708b68
-
SHA256
f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447
-
SHA512
006a5027680f79267420fd0fa5558543eb0f84ece26ecf7054edd165d653f719eb55fdf27a19be2c4822135011f4d29ee85f096891559a9d11c7530243711553
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3132 4748 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4628 wrote to memory of 4748 4628 rundll32.exe rundll32.exe PID 4628 wrote to memory of 4748 4628 rundll32.exe rundll32.exe PID 4628 wrote to memory of 4748 4628 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5df41eeba7527422972758130e733347978f5bf1b43996a2eb93495ed71c447.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4748 -ip 47481⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4748-130-0x0000000000000000-mapping.dmp