Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
13f8d4f3097e98c843e9a594b7a9c128.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
13f8d4f3097e98c843e9a594b7a9c128.dll
Resource
win10v2004-20220718-en
General
-
Target
13f8d4f3097e98c843e9a594b7a9c128.dll
-
Size
5.0MB
-
MD5
13f8d4f3097e98c843e9a594b7a9c128
-
SHA1
a808002fdd82d43a7c828ba501880a13e739c512
-
SHA256
1d18c87cdc79ab31f7213ebbe9366fbc94a8d2632fda53531680b1b9eccd109d
-
SHA512
782362654e5239fbfd927c415831049024839480e9e2a1f22e589d60a7b686a19be81e1875a6538d6d22886c53752db8abd13c549a09a3b7728eb8ade76eba6d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mssecsvc.exepid process 1252 mssecsvc.exe -
Drops file in Windows directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2656 1252 WerFault.exe mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 672 wrote to memory of 904 672 rundll32.exe rundll32.exe PID 672 wrote to memory of 904 672 rundll32.exe rundll32.exe PID 672 wrote to memory of 904 672 rundll32.exe rundll32.exe PID 904 wrote to memory of 1252 904 rundll32.exe mssecsvc.exe PID 904 wrote to memory of 1252 904 rundll32.exe mssecsvc.exe PID 904 wrote to memory of 1252 904 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13f8d4f3097e98c843e9a594b7a9c128.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13f8d4f3097e98c843e9a594b7a9c128.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 2724⤵
- Program crash
PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1252 -ip 12521⤵PID:2528
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5224bb7f0c81b91aea866d27586524bfb
SHA1a2c3cd6ba0bb7ca69c7df4c43cc7d5d0ecca5273
SHA256ead5d430902741b5d519e689bea4ed4f1660a441ef23a04440605fc68ca90a08
SHA512d292d621ec30e1ddf72c2aaab2637f3a9a0ed5a611442c0407017d4944f0b4c404bc210d2d290fb8b71df8530f9e96771621636f38d8a0308f157713d3287ec4
-
Filesize
3.6MB
MD5224bb7f0c81b91aea866d27586524bfb
SHA1a2c3cd6ba0bb7ca69c7df4c43cc7d5d0ecca5273
SHA256ead5d430902741b5d519e689bea4ed4f1660a441ef23a04440605fc68ca90a08
SHA512d292d621ec30e1ddf72c2aaab2637f3a9a0ed5a611442c0407017d4944f0b4c404bc210d2d290fb8b71df8530f9e96771621636f38d8a0308f157713d3287ec4