Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 12:24
Static task
static1
Behavioral task
behavioral1
Sample
1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll
Resource
win10v2004-20220812-en
General
-
Target
1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll
-
Size
14.6MB
-
MD5
6eaf6f6a28b0cae784a04a59c36a102b
-
SHA1
63ccbdf14e6621c98ada7e4228c7b100c4850e16
-
SHA256
1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026
-
SHA512
e5490f763ffab322f1e98ad342474cb1a168d3d740d628ab1982a5516b0456af406d68c307255566249e2480d84bb3f0097d31fc4596b8b2f443dcfd92513d0e
-
SSDEEP
196608:4RPoqFr6cC5APwjHD+nqNFneTLIOMNjKdeNeC6JVc5g4C/GdAsMD0xwr:yoer6nnjHFneTLIOMwUNP6b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000b000000022f55-135.dat upx behavioral2/files/0x000b000000022f55-136.dat upx behavioral2/memory/4852-137-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2892 4852 WerFault.exe 84 4088 4736 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4736 4660 rundll32.exe 83 PID 4660 wrote to memory of 4736 4660 rundll32.exe 83 PID 4660 wrote to memory of 4736 4660 rundll32.exe 83 PID 4736 wrote to memory of 4852 4736 rundll32.exe 84 PID 4736 wrote to memory of 4852 4736 rundll32.exe 84 PID 4736 wrote to memory of 4852 4736 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 2644⤵
- Program crash
PID:2892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6803⤵
- Program crash
PID:4088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4852 -ip 48521⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4736 -ip 47361⤵PID:1696
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD571a0cc521d70fca7e86fba2b799e54e3
SHA1689ab159541c45d738be7329918808c1c1e58050
SHA256e13ad23118da481600ad8e4ffd4d5e060eeb23da05eeffcd299c2cdcfa3dc023
SHA5126da749226ddc085a8d04a8bdd3c30a0476257673c1489281301dc3204cc32fae6740e5b4368f8bc53d882ae7415034bf9dc98247504425e7c815387578796952
-
Filesize
206KB
MD571a0cc521d70fca7e86fba2b799e54e3
SHA1689ab159541c45d738be7329918808c1c1e58050
SHA256e13ad23118da481600ad8e4ffd4d5e060eeb23da05eeffcd299c2cdcfa3dc023
SHA5126da749226ddc085a8d04a8bdd3c30a0476257673c1489281301dc3204cc32fae6740e5b4368f8bc53d882ae7415034bf9dc98247504425e7c815387578796952