Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
67772ecec97387478b1202e0102fac6d7dde36856c107c8b3d2c20c75016269f.dll
Resource
win7-20220901-en
General
-
Target
67772ecec97387478b1202e0102fac6d7dde36856c107c8b3d2c20c75016269f.dll
-
Size
148KB
-
MD5
0cf2ca39934b9db2e4bae4175a0a4e40
-
SHA1
3b43a967397041d6b45c2fd97efc406e09ab0978
-
SHA256
67772ecec97387478b1202e0102fac6d7dde36856c107c8b3d2c20c75016269f
-
SHA512
60e7345c33329b690fdc1ab93499d7bbd12c78100fccbb1343b79e25b7c1df18eaa0016dc6398b092adb861306b319af1e5306a68500658e3160d023ab560a9b
-
SSDEEP
3072:Ia2xurd/UbSSWos9ceZoBvdGp18v5TRRVf1:ITbSt9QVGkNRr1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1148 rundll32Srv.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-56.dat upx behavioral1/files/0x0008000000005c51-58.dat upx behavioral1/memory/1148-63-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1532 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1392 1532 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1460 wrote to memory of 1532 1460 rundll32.exe 27 PID 1532 wrote to memory of 1148 1532 rundll32.exe 28 PID 1532 wrote to memory of 1148 1532 rundll32.exe 28 PID 1532 wrote to memory of 1148 1532 rundll32.exe 28 PID 1532 wrote to memory of 1148 1532 rundll32.exe 28 PID 1532 wrote to memory of 1392 1532 rundll32.exe 29 PID 1532 wrote to memory of 1392 1532 rundll32.exe 29 PID 1532 wrote to memory of 1392 1532 rundll32.exe 29 PID 1532 wrote to memory of 1392 1532 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67772ecec97387478b1202e0102fac6d7dde36856c107c8b3d2c20c75016269f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67772ecec97387478b1202e0102fac6d7dde36856c107c8b3d2c20c75016269f.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 2283⤵
- Program crash
PID:1392
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a