Analysis
-
max time kernel
140s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 00:15
Static task
static1
Behavioral task
behavioral1
Sample
8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5.dll
Resource
win10v2004-20220812-en
General
-
Target
8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5.dll
-
Size
244KB
-
MD5
75e6c5f90d12885e6ae103440f4ee500
-
SHA1
342cb45b2f28644c4029ae297450f28a684eadb3
-
SHA256
8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5
-
SHA512
02225b2db94982671c5bd75ae7481d5e335f8e6e84dcb73c6b9bc2deb46f11e77548184ff3065ac58b48f01cefe9f8b36ef66491d7e81829e57b90f3e446f992
-
SSDEEP
3072:iHJ3uezIH4TwDnbU+VPBNiz2130BSuqPeBZuIvv2nxy4B0hw+Dc2c2C:tU4HHpB1jcZbvenxybG+pc2C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000a000000022e01-134.dat upx behavioral2/files/0x000a000000022e01-135.dat upx behavioral2/memory/1408-137-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4604 1408 WerFault.exe 83 5016 4016 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2968 wrote to memory of 4016 2968 rundll32.exe 82 PID 2968 wrote to memory of 4016 2968 rundll32.exe 82 PID 2968 wrote to memory of 4016 2968 rundll32.exe 82 PID 4016 wrote to memory of 1408 4016 rundll32.exe 83 PID 4016 wrote to memory of 1408 4016 rundll32.exe 83 PID 4016 wrote to memory of 1408 4016 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a005b30a4aba7b10a1146826a189d8ec240316464b5b45cdaed56272608bbc5.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 2204⤵
- Program crash
PID:4604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6483⤵
- Program crash
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1408 -ip 14081⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4016 -ip 40161⤵PID:4180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD53057899a0737ff16ec205af279774bc3
SHA1d845fc786a80680215fc7fdbaf359d0f6208ecb2
SHA256ca004129badd533f7f0ec63e96dbead81b675da7794ce6ebb35cfa11c1f5de23
SHA5124588c3c1229f02e542ccefab17b6a87fd7b6f1f516ab8643211f83502ec7e620d58c73de97dca11178b8c1a897be8c3497611655c7bb6d007fc545f050bd412d
-
Filesize
177KB
MD53057899a0737ff16ec205af279774bc3
SHA1d845fc786a80680215fc7fdbaf359d0f6208ecb2
SHA256ca004129badd533f7f0ec63e96dbead81b675da7794ce6ebb35cfa11c1f5de23
SHA5124588c3c1229f02e542ccefab17b6a87fd7b6f1f516ab8643211f83502ec7e620d58c73de97dca11178b8c1a897be8c3497611655c7bb6d007fc545f050bd412d