Analysis

  • max time kernel
    153s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 15:17

General

  • Target

    88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll

  • Size

    65KB

  • MD5

    14743fd259d9dc14f5806c2ce7bb5ed1

  • SHA1

    b5cdf5a1ec92daabf366af1f74a8e1080fe1d917

  • SHA256

    88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498

  • SHA512

    e96aa10dfa315d8f0dfa3a5a9c8965293c337f1e189757a0e7a18494c44f9e50f6ed10616e19986c0b9cb16b047d3dda22ddd2994fd8f023f5249308ef153118

  • SSDEEP

    1536:Gm96BS7LL16+o9yHSmxthT/dTSoW9j5ZC6:G3Bon16JyHScVVG9j7d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Users\Admin\AppData\Local\Temp\hrlB710.tmp
        C:\Users\Admin\AppData\Local\Temp\hrlB710.tmp
        3⤵
        • Executes dropped EXE
        PID:3008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 276
          4⤵
          • Program crash
          PID:4464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3008 -ip 3008
    1⤵
      PID:1736

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hrlB710.tmp

      Filesize

      58KB

      MD5

      ec4c8d3d959f6f749c7b281396811b5a

      SHA1

      1ef33088b15f3f34545d67136d2c250da37b10f7

      SHA256

      d610fddc1d8383f19b0ba6ff5b77c168465dd5580235c106c1523f82e59fbe70

      SHA512

      f18fd3667845043f1b03f5200074a5bff8279ad7090a4c7abfb48b60f1db77dcd6b062a98164d3b662f7ef3208f36ef6bb15212067d254af9a841b1fdc50a2f4

    • C:\Users\Admin\AppData\Local\Temp\hrlB710.tmp

      Filesize

      58KB

      MD5

      ec4c8d3d959f6f749c7b281396811b5a

      SHA1

      1ef33088b15f3f34545d67136d2c250da37b10f7

      SHA256

      d610fddc1d8383f19b0ba6ff5b77c168465dd5580235c106c1523f82e59fbe70

      SHA512

      f18fd3667845043f1b03f5200074a5bff8279ad7090a4c7abfb48b60f1db77dcd6b062a98164d3b662f7ef3208f36ef6bb15212067d254af9a841b1fdc50a2f4

    • memory/3008-136-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB