Analysis
-
max time kernel
67s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72.dll
Resource
win10v2004-20220812-en
General
-
Target
60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72.dll
-
Size
380KB
-
MD5
360407b1a91bb260b29a182ebbf74ebd
-
SHA1
e93038fc60843d7cbef81e68a17aa64612f5e22f
-
SHA256
60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72
-
SHA512
c87cffdffa8674dc095e2e16aa10d79a146c8885d7cfeaf04c712724822e11e2f144e310f26c4fee4c5b9576769a24c2f06f6ea8785e7f8c6e6ca272b9486cd2
-
SSDEEP
6144:Fs7mHiUNIxGrfrDIQBk2TES1Fh/pAYlJGkLaZvpSn9iGmchd7F9mwdTh4XQ:FssHNkGrfQR2TESDh1JEhpm9iGmchdxf
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1180 268 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 432 wrote to memory of 268 432 rundll32.exe rundll32.exe PID 268 wrote to memory of 1180 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1180 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1180 268 rundll32.exe WerFault.exe PID 268 wrote to memory of 1180 268 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60555b6cd2a8d40fc3cac94677ca754828400e4d2171f1deea2dd7aad36cfa72.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 2283⤵
- Program crash
PID:1180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-54-0x0000000000000000-mapping.dmp
-
memory/268-55-0x0000000076D71000-0x0000000076D73000-memory.dmpFilesize
8KB
-
memory/268-56-0x00000000003B0000-0x0000000000413000-memory.dmpFilesize
396KB
-
memory/268-61-0x0000000000220000-0x0000000000282000-memory.dmpFilesize
392KB
-
memory/1180-60-0x0000000000000000-mapping.dmp