Analysis

  • max time kernel
    144s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 17:55

General

  • Target

    1098ef53908853f36bf89ff347d988092fb7b487a4e476fb3bf0b66ea0cc9d20.dll

  • Size

    227KB

  • MD5

    0379ae40afbc25490230bdc9232a3af0

  • SHA1

    9444e5123f99c9be362cf738f5021226cc49ef33

  • SHA256

    1098ef53908853f36bf89ff347d988092fb7b487a4e476fb3bf0b66ea0cc9d20

  • SHA512

    3ee816b12411fe30e66640ad7bb0ed13f1e1ee0e88afcbdbf0afa72205780318e5a5ead506f8c78905cbb87ac1581fc2c8792f2c9e34b32001676db9c4ff2d99

  • SSDEEP

    3072:d0NbrbkYHUyP9eECVWfpIhbWoVnW6IioARoKO7JurqeBTg4vRP86TvOB5n+902WE:erkYHjIWeWcd71bynl9A/hRLix6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1098ef53908853f36bf89ff347d988092fb7b487a4e476fb3bf0b66ea0cc9d20.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1098ef53908853f36bf89ff347d988092fb7b487a4e476fb3bf0b66ea0cc9d20.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 156
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 224
        3⤵
        • Program crash
        PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • memory/828-55-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

    Filesize

    8KB

  • memory/828-70-0x00000000750C0000-0x00000000750FE000-memory.dmp

    Filesize

    248KB

  • memory/828-71-0x0000000075080000-0x00000000750BE000-memory.dmp

    Filesize

    248KB

  • memory/828-72-0x00000000750C0000-0x00000000750FE000-memory.dmp

    Filesize

    248KB

  • memory/828-73-0x00000000750C0000-0x00000000750FE000-memory.dmp

    Filesize

    248KB