Analysis
-
max time kernel
175s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:16
Behavioral task
behavioral1
Sample
Documento_00912014.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Documento_00912014.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Documento_00912014.dll
-
Size
300KB
-
MD5
0b4d2886d323bdd77fd71a8388c7611e
-
SHA1
4aedb19eeb153ce6933fb8cdf20d032aa282b628
-
SHA256
9a6dfa902242eb9b67ea40a3bbe491bd00e7eca17030c62ebe7ef998d5848c2b
-
SHA512
e869749ec8fb7412695e5c9b90f90c486109b1eedc3099ff5f7899be30a5fe1bdb3936f0e5b2a2ad4b1c659b348be51df3b0afb6efa308effdb18c37faf6429b
-
SSDEEP
6144:wfvvKKzAYf0L+6i0t+myTC7dQe0gKss4KJJzujIRryZCI4W7RUR:kvrzAYYj+myTC7UfpfzOIRGYW7RU
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 41 4540 rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/4540-133-0x0000000002090000-0x0000000002176000-memory.dmp upx behavioral2/memory/4540-134-0x0000000002090000-0x0000000002176000-memory.dmp upx behavioral2/memory/4540-135-0x0000000002090000-0x0000000002176000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4636 4540 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3620 wrote to memory of 4540 3620 rundll32.exe rundll32.exe PID 3620 wrote to memory of 4540 3620 rundll32.exe rundll32.exe PID 3620 wrote to memory of 4540 3620 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Documento_00912014.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Documento_00912014.dll,#12⤵
- Blocklisted process makes network request
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8363⤵
- Program crash
PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4540 -ip 45401⤵PID:3232