Analysis
-
max time kernel
67s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 20:07
Static task
static1
Behavioral task
behavioral1
Sample
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll
Resource
win7-20220812-en
General
-
Target
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll
-
Size
699KB
-
MD5
6709cc3bb411041f94ef37893a42c75d
-
SHA1
c80cf20de826434d709f524032c5f8287a3a111a
-
SHA256
1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d
-
SHA512
dee11a33e5661334f263a4acdabcf52a8333e27dbe55b8fb567cbaf4532a8afe22749b04003610f7db4e6f6d97a7af93a0e3d14616bd1bb1db5c81ae1933b38a
-
SSDEEP
12288:3zb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwP20:3zb1MlCKUQyUmjtczu6Prs9pgWoopoo7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x0007000000022f45-134.dat upx behavioral2/files/0x0007000000022f45-135.dat upx behavioral2/memory/2764-137-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1184 2764 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4760 wrote to memory of 1920 4760 rundll32.exe 80 PID 4760 wrote to memory of 1920 4760 rundll32.exe 80 PID 4760 wrote to memory of 1920 4760 rundll32.exe 80 PID 1920 wrote to memory of 2764 1920 rundll32.exe 81 PID 1920 wrote to memory of 2764 1920 rundll32.exe 81 PID 1920 wrote to memory of 2764 1920 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f6a5564252c6c0bc43ed68e3d07a41eabfea21d4868aadd44891937f8f3604d.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2724⤵
- Program crash
PID:1184
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2764 -ip 27641⤵PID:2928
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d
-
Filesize
42KB
MD549073a31e6bf259b1a33d15808d4cba9
SHA1fb149303da7ee1da5b36b6e27f7c9d2244a6b983
SHA25616a36360e050860a4c6e37d69fbab941e3c93a1cd9ab8d17837029b3e7110ffa
SHA5129a369bc1cfcaeaf39919a90c2ef5ad01fa31a555dc05ed91065ee373212e1fe50d6ca43d8ec37f147206cdf366e6c5f473d7fb5545b5e6c46c907d7e1d4af38d