Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:55
Static task
static1
Behavioral task
behavioral1
Sample
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
Resource
win10v2004-20220812-en
General
-
Target
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll
-
Size
424KB
-
MD5
b00765f779f1d5435f4c52d560834617
-
SHA1
444fe4cabde96f54aa2e260d51478762541ee6e5
-
SHA256
7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533
-
SHA512
403e2fa8f5d85793a9399d7998d6269b1a64e1bf566e9bfcd09c25281e51ab3d80fb2f64e9a5cfa4e0b2724ce8d1d46046b224d5d4bc786d01c1fb6d77c4ffed
-
SSDEEP
6144:vopn97RMgON8vFK95OvZ6f32bPvcQWdmTqmNqthPBbt5a2gKh65wcl4crqg:voDlwN8vw5OumbPvqdHhpt5a2Vsd48q
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1188 1124 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1028 wrote to memory of 1124 1028 rundll32.exe rundll32.exe PID 1028 wrote to memory of 1124 1028 rundll32.exe rundll32.exe PID 1028 wrote to memory of 1124 1028 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a6b3debef45178d9f5439097a0842229e07497505a103bea49187cb6a913533.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 5843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1124 -ip 11241⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1124-132-0x0000000000000000-mapping.dmp