Analysis
-
max time kernel
51s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 14:34
Behavioral task
behavioral1
Sample
5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff.dll
Resource
win7-20220718-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff.dll
Resource
win10v2004-20220721-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff.dll
-
Size
204KB
-
MD5
cbd6d226ddd78813fa9932b673a58cb4
-
SHA1
bb584296dcef74fa471f42b8f354e8efca39e436
-
SHA256
5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff
-
SHA512
48226f65663eefaa1485c8db08b167393b1a8430b8ef7c9091a479d69e3333fbb1a6cc5aebd12dfb01691758361ab385d3f8bfdd6868d5464cae66002e2c1326
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4516 4916 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3320 wrote to memory of 4916 3320 rundll32.exe rundll32.exe PID 3320 wrote to memory of 4916 3320 rundll32.exe rundll32.exe PID 3320 wrote to memory of 4916 3320 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5867b6c34dbb00dc599fa6de098fdf9c6f48b6cc88d319b42b391c499c937fff.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4916 -ip 49161⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4916-131-0x0000000000000000-mapping.dmp