Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 20:07
Static task
static1
Behavioral task
behavioral1
Sample
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll
Resource
win7-20220812-en
General
-
Target
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll
-
Size
699KB
-
MD5
6709cc3bb411041f94ef37893a42c75d
-
SHA1
c80cf20de826434d709f524032c5f8287a3a111a
-
SHA256
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d
-
SHA512
dee11a33e5661334f263a4acdabcf52a8333e27dbe55b8fb567cbaf4532a8afe22749b04003610f7db4e6f6d97a7af93a0e3d14616bd1bb1db5c81ae1933b38a
-
SSDEEP
12288:3zb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwP20:3zb1MlCKUQyUmjtczu6Prs9pgWoopoo7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1920 rundll32Srv.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00140000000054ab-61.dat upx behavioral1/files/0x00140000000054ab-62.dat upx behavioral1/files/0x00140000000054ab-63.dat upx behavioral1/memory/1920-67-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1932 rundll32.exe 1932 rundll32.exe 1004 WerFault.exe 1004 WerFault.exe 1004 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1004 1920 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1896 wrote to memory of 1932 1896 rundll32.exe 28 PID 1932 wrote to memory of 1920 1932 rundll32.exe 29 PID 1932 wrote to memory of 1920 1932 rundll32.exe 29 PID 1932 wrote to memory of 1920 1932 rundll32.exe 29 PID 1932 wrote to memory of 1920 1932 rundll32.exe 29 PID 1920 wrote to memory of 1004 1920 rundll32Srv.exe 30 PID 1920 wrote to memory of 1004 1920 rundll32Srv.exe 30 PID 1920 wrote to memory of 1004 1920 rundll32Srv.exe 30 PID 1920 wrote to memory of 1004 1920 rundll32Srv.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 884⤵
- Loads dropped DLL
- Program crash
PID:1004
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d