Resubmissions
22-09-2022 16:57
220922-vga6dabhg7 1022-09-2022 16:56
220922-vf4rasfgaq 1022-09-2022 16:48
220922-va6cyabhf9 813-09-2022 17:49
220913-wd1sascabl 8Analysis
-
max time kernel
43s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
submitted
13-09-2022 17:49
Static task
static1
Behavioral task
behavioral1
Sample
b26bbe590caac12efcf76a1d62b390aa.dll
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b26bbe590caac12efcf76a1d62b390aa.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
b26bbe590caac12efcf76a1d62b390aa.dll
-
Size
2.7MB
-
MD5
b26bbe590caac12efcf76a1d62b390aa
-
SHA1
8027ce80904f287ee72ceee68a0ec95dddf309ac
-
SHA256
4ea86098be9e4fd932758729fbe6c7fd4c53babf228388b24f8b263ebccf56f4
-
SHA512
f5ac91af8fb36d990082ccab8f2ba130ac2cdfd1c3d29e6dd26be4ae59346fde3c98eb1c08c80f7e44b22ac33f5ab60ef8216fb54dfe0eb8e8245297e7f9f774
-
SSDEEP
49152:94j4pRhvvWPcqysG2ZLyZMCWH+DGeQwa:CjcvWPcqZHcZMCWH+Kt3
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1516 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1684 1516 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1464 wrote to memory of 1516 1464 rundll32.exe 26 PID 1516 wrote to memory of 1684 1516 rundll32.exe 27 PID 1516 wrote to memory of 1684 1516 rundll32.exe 27 PID 1516 wrote to memory of 1684 1516 rundll32.exe 27 PID 1516 wrote to memory of 1684 1516 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b26bbe590caac12efcf76a1d62b390aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b26bbe590caac12efcf76a1d62b390aa.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 2843⤵
- Program crash
PID:1684
-
-