Analysis
-
max time kernel
173s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
93cb5db461880af1ec9737b017e213f1216bdf2385ad0fe52dba8d2d38d668df.dll
Resource
win7-20221111-en
General
-
Target
93cb5db461880af1ec9737b017e213f1216bdf2385ad0fe52dba8d2d38d668df.dll
-
Size
264KB
-
MD5
02d4ddeeb7edadf1a605d6f69d95b3b7
-
SHA1
e15299d6ee01cb747272601c1089ec7229620e62
-
SHA256
93cb5db461880af1ec9737b017e213f1216bdf2385ad0fe52dba8d2d38d668df
-
SHA512
aed02b10b5a1b32169d8f9651273feaf5115ea3c982aee9ce3465d8a8d9d0019e498544d2129d483d8576d5dcc45bece18976f35599549d5306e32ecd6fe4b8d
-
SSDEEP
6144:izQA45pvVPttxxp70OTJimi8nmYusgmdK6MvDUM70qG/M2/UdI:izQAMvhPLR0CimbTuRudMv37N+PUa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 864 rundll32mgr.exe -
Processes:
resource yara_rule behavioral2/memory/864-139-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
rundll32mgr.exepid process 864 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3412 5092 WerFault.exe rundll32.exe 3128 864 WerFault.exe rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1680 wrote to memory of 5092 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 5092 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 5092 1680 rundll32.exe rundll32.exe PID 5092 wrote to memory of 864 5092 rundll32.exe rundll32mgr.exe PID 5092 wrote to memory of 864 5092 rundll32.exe rundll32mgr.exe PID 5092 wrote to memory of 864 5092 rundll32.exe rundll32mgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93cb5db461880af1ec9737b017e213f1216bdf2385ad0fe52dba8d2d38d668df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93cb5db461880af1ec9737b017e213f1216bdf2385ad0fe52dba8d2d38d668df.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 101924⤵
- Program crash
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 6123⤵
- Program crash
PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5092 -ip 50921⤵PID:176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 864 -ip 8641⤵PID:1892
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
177KB
MD59d4ef42cddc4e975b05c2f3f6235129e
SHA15f81976e555bfce1389b9304ad4e4e61d94edf27
SHA25672e36957d1c7593d0f7165823e3a27038a2cb772c1f22c56a9086296ff297fac
SHA512a881e4e2dfd9caa972fdfb40bc6dc7e95ad5b69fa5e4437c353d76def7125e3ecc43e6a0c6b07642f7cd4112cfc4dbeb5918de67cd0790ad6764a111f3d8dc2d
-
Filesize
177KB
MD59d4ef42cddc4e975b05c2f3f6235129e
SHA15f81976e555bfce1389b9304ad4e4e61d94edf27
SHA25672e36957d1c7593d0f7165823e3a27038a2cb772c1f22c56a9086296ff297fac
SHA512a881e4e2dfd9caa972fdfb40bc6dc7e95ad5b69fa5e4437c353d76def7125e3ecc43e6a0c6b07642f7cd4112cfc4dbeb5918de67cd0790ad6764a111f3d8dc2d