Resubmissions
22-09-2022 16:57
220922-vga6dabhg7 1022-09-2022 16:56
220922-vf4rasfgaq 1022-09-2022 16:48
220922-va6cyabhf9 813-09-2022 17:49
220913-wd1sascabl 8Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-09-2022 16:57
Behavioral task
behavioral1
Sample
b26bbe590caac12efcf76a1d62b390aa.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b26bbe590caac12efcf76a1d62b390aa.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
b26bbe590caac12efcf76a1d62b390aa.dll
-
Size
2.7MB
-
MD5
b26bbe590caac12efcf76a1d62b390aa
-
SHA1
8027ce80904f287ee72ceee68a0ec95dddf309ac
-
SHA256
4ea86098be9e4fd932758729fbe6c7fd4c53babf228388b24f8b263ebccf56f4
-
SHA512
f5ac91af8fb36d990082ccab8f2ba130ac2cdfd1c3d29e6dd26be4ae59346fde3c98eb1c08c80f7e44b22ac33f5ab60ef8216fb54dfe0eb8e8245297e7f9f774
-
SSDEEP
49152:94j4pRhvvWPcqysG2ZLyZMCWH+DGeQwa:CjcvWPcqZHcZMCWH+Kt3
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 284 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 876 284 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 1480 wrote to memory of 284 1480 rundll32.exe 27 PID 284 wrote to memory of 876 284 rundll32.exe 28 PID 284 wrote to memory of 876 284 rundll32.exe 28 PID 284 wrote to memory of 876 284 rundll32.exe 28 PID 284 wrote to memory of 876 284 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b26bbe590caac12efcf76a1d62b390aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b26bbe590caac12efcf76a1d62b390aa.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 284 -s 2843⤵
- Program crash
PID:876
-
-