Analysis
-
max time kernel
153s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll
Resource
win10v2004-20221111-en
General
-
Target
88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll
-
Size
65KB
-
MD5
14743fd259d9dc14f5806c2ce7bb5ed1
-
SHA1
b5cdf5a1ec92daabf366af1f74a8e1080fe1d917
-
SHA256
88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498
-
SHA512
e96aa10dfa315d8f0dfa3a5a9c8965293c337f1e189757a0e7a18494c44f9e50f6ed10616e19986c0b9cb16b047d3dda22ddd2994fd8f023f5249308ef153118
-
SSDEEP
1536:Gm96BS7LL16+o9yHSmxthT/dTSoW9j5ZC6:G3Bon16JyHScVVG9j7d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 hrlB710.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 3008 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 820 wrote to memory of 440 820 rundll32.exe 83 PID 820 wrote to memory of 440 820 rundll32.exe 83 PID 820 wrote to memory of 440 820 rundll32.exe 83 PID 440 wrote to memory of 3008 440 rundll32.exe 85 PID 440 wrote to memory of 3008 440 rundll32.exe 85 PID 440 wrote to memory of 3008 440 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88eb128b6fd241be7c281c53192117d55bca4b92596cdfb3c6796bde8111d498.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\hrlB710.tmpC:\Users\Admin\AppData\Local\Temp\hrlB710.tmp3⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 2764⤵
- Program crash
PID:4464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3008 -ip 30081⤵PID:1736
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5ec4c8d3d959f6f749c7b281396811b5a
SHA11ef33088b15f3f34545d67136d2c250da37b10f7
SHA256d610fddc1d8383f19b0ba6ff5b77c168465dd5580235c106c1523f82e59fbe70
SHA512f18fd3667845043f1b03f5200074a5bff8279ad7090a4c7abfb48b60f1db77dcd6b062a98164d3b662f7ef3208f36ef6bb15212067d254af9a841b1fdc50a2f4
-
Filesize
58KB
MD5ec4c8d3d959f6f749c7b281396811b5a
SHA11ef33088b15f3f34545d67136d2c250da37b10f7
SHA256d610fddc1d8383f19b0ba6ff5b77c168465dd5580235c106c1523f82e59fbe70
SHA512f18fd3667845043f1b03f5200074a5bff8279ad7090a4c7abfb48b60f1db77dcd6b062a98164d3b662f7ef3208f36ef6bb15212067d254af9a841b1fdc50a2f4