Analysis
-
max time kernel
51s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-10-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
RunDLL-1.bat
Resource
win7-20220901-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
RunDLL-1.bat
Resource
win10-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
overpowering.dll
Resource
win7-20220812-en
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
overpowering.dll
Resource
win10-20220812-en
0 signatures
150 seconds
General
-
Target
RunDLL-1.bat
-
Size
37B
-
MD5
7a90cce379f52ea107d00fa548e39018
-
SHA1
33438af9a7c7e8d10e4028dcbd772c168298c3a2
-
SHA256
608727a7e3ae8591377a6966d2d15f087dd13a5b4668b8d814a8e09b540f4bc3
-
SHA512
2a3082e6b1441393a3515612d844ca50204c551453fdd6da46d05cefdb425571d9d58005ac0eb64032e55b5ed4778beca4be885ac34091f85d50c585e0e9f0b6
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3776 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4992 3776 WerFault.exe 67 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3776 2648 cmd.exe 67 PID 2648 wrote to memory of 3776 2648 cmd.exe 67
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RunDLL-1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\rundll32.exerundll32.exe overpowering.dat,ctrlrun2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:3776 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3776 -s 1003⤵
- Program crash
PID:4992
-
-