Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 17:26
Behavioral task
behavioral1
Sample
1252-59-0x0000000000170000-0x00000000001F0000-memory.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1252-59-0x0000000000170000-0x00000000001F0000-memory.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1252-59-0x0000000000170000-0x00000000001F0000-memory.dll
-
Size
512KB
-
MD5
4e7ae1d84095953f8c4ee1021f514b30
-
SHA1
4a54f38eda9948ba1a7586be8c1f11c22c9c260d
-
SHA256
dfd91c9c9d221d62eb180c52691f179821ad2c6779799a96dd942bd82d2556fe
-
SHA512
406adb27fe5b5b88d72663cbb9aa880b47f14175eaf3e573f3ee10ec3d5d5525ffc9a8ced5c58188623080735018dba3e1aeb3c806dd76bf9ca13371fcf25d55
-
SSDEEP
12288:Xe8W8aXJTYcTb4k5IM/Q9r2420Tmsr4Xzx93JRr2m5ovPi/VH:XvotTblVMr2B0T61/dT5ei/VH
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5084 3504 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3172 wrote to memory of 3504 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 3504 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 3504 3172 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1252-59-0x0000000000170000-0x00000000001F0000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1252-59-0x0000000000170000-0x00000000001F0000-memory.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3504 -ip 35041⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3504-132-0x0000000000000000-mapping.dmp