Analysis
-
max time kernel
60s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5.dll
Resource
win10v2004-20220901-en
General
-
Target
7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5.dll
-
Size
119KB
-
MD5
0e2697b9bf1f449ed42b0e1c2a343260
-
SHA1
5bf03c40ab0373c6b14a6e4aa9ed25bc933787d4
-
SHA256
7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5
-
SHA512
3bd393fcc07f782b67e1a8cc683240d027b00f41be147ec816f7c17cfaf334b83a9d5974ec92d5d2cc2fde6d378ec8d0569e803546ba25e0a97bdccdabe63d63
-
SSDEEP
3072:jfiV+o1W31fvzs4d30uxxIuaC0ru8I+duQYwTeCQ:jq1WFXzs4d9xx3EtwQYwTBQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0007000000022de8-134.dat upx behavioral2/files/0x0007000000022de8-135.dat upx behavioral2/memory/804-137-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 208 804 WerFault.exe 83 1084 3012 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3012 3736 rundll32.exe 82 PID 3736 wrote to memory of 3012 3736 rundll32.exe 82 PID 3736 wrote to memory of 3012 3736 rundll32.exe 82 PID 3012 wrote to memory of 804 3012 rundll32.exe 83 PID 3012 wrote to memory of 804 3012 rundll32.exe 83 PID 3012 wrote to memory of 804 3012 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7776748a26841ae3c40803cb4434f11cc0133992b70c47bee34521313f9832d5.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 2644⤵
- Program crash
PID:208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 6203⤵
- Program crash
PID:1084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3012 -ip 30121⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 804 -ip 8041⤵PID:3876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5393c4ce895316ab40762ed6e5ac45d0b
SHA1c3c16f65eb1af8362b009471e1a090395215df99
SHA2561d151f17b9769434e7298a916a649d0d281bfba927dbe70b1bff5e1ba11936f8
SHA5127208e3d8a5f7d2a78f73b5108def94e5724b0d1bf14f18fcdefb70861a55b116d8a989378bd3b86d700c210709f8cc727d76466583a93f34402aa5e68d55a430
-
Filesize
105KB
MD5393c4ce895316ab40762ed6e5ac45d0b
SHA1c3c16f65eb1af8362b009471e1a090395215df99
SHA2561d151f17b9769434e7298a916a649d0d281bfba927dbe70b1bff5e1ba11936f8
SHA5127208e3d8a5f7d2a78f73b5108def94e5724b0d1bf14f18fcdefb70861a55b116d8a989378bd3b86d700c210709f8cc727d76466583a93f34402aa5e68d55a430