Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e.dll
Resource
win10v2004-20220812-en
General
-
Target
6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e.dll
-
Size
160KB
-
MD5
0af92c3df138ddb69574aac5bb6c530d
-
SHA1
75be29a76c3ab13f66da35a615ea767586f9a784
-
SHA256
6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e
-
SHA512
6b3cf9a7cb9f4abef978a1acbf9e973fed91ee1fbd606a47612a4f9f58ea8100cd9efb6b103b6b061655593bcb8b75d2a0dbdbdb0447d2213000dc13c634267c
-
SSDEEP
3072:lcP+452cgkgaZj/RrANjMIVOhv/f1/0/m+kyo/mEa:43QSzRrtRfB/mEa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4636 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000a000000022dfb-134.dat upx behavioral2/files/0x000a000000022dfb-135.dat upx behavioral2/memory/4636-137-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5112 4636 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2176 wrote to memory of 5024 2176 rundll32.exe 80 PID 2176 wrote to memory of 5024 2176 rundll32.exe 80 PID 2176 wrote to memory of 5024 2176 rundll32.exe 80 PID 5024 wrote to memory of 4636 5024 rundll32.exe 81 PID 5024 wrote to memory of 4636 5024 rundll32.exe 81 PID 5024 wrote to memory of 4636 5024 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ac725ef5faf543c182d14db90defc97f519651426f6474849845a3874ea026e.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 2644⤵
- Program crash
PID:5112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4636 -ip 46361⤵PID:3516
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5783358db5bbd753eb67d9b5c2ea05b87
SHA11e49aa868fe0486ed855d0800aae664fb089f834
SHA2566e8c7e0832fd7499afcb8bfa417f73c592cbc007c17964c5e9494012049b6ec5
SHA51288334d9189c1589cbec59be8ad38fba6b0da02326ff38e118899c46bf0c72c9b01dbea976407398dbb8d6a1bc5ef3712b49b721e11f6b9444ef7f68705032379
-
Filesize
133KB
MD5783358db5bbd753eb67d9b5c2ea05b87
SHA11e49aa868fe0486ed855d0800aae664fb089f834
SHA2566e8c7e0832fd7499afcb8bfa417f73c592cbc007c17964c5e9494012049b6ec5
SHA51288334d9189c1589cbec59be8ad38fba6b0da02326ff38e118899c46bf0c72c9b01dbea976407398dbb8d6a1bc5ef3712b49b721e11f6b9444ef7f68705032379