Analysis
-
max time kernel
144s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:18
Behavioral task
behavioral1
Sample
4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d.dll
Resource
win10v2004-20220812-en
General
-
Target
4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d.dll
-
Size
75KB
-
MD5
5f31e4ad121db2276f493eb6e35d6cd0
-
SHA1
2e32081f53f37fe94142d16b7499a928a7b096c5
-
SHA256
4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d
-
SHA512
a85408ff8f07deb1d06c957c376ba33be6e1274eda99c1eb33b0102083838f4416f31d40acf32d93dedea8f98ef77c389c23b08334f96d66d16d89fb5433ab15
-
SSDEEP
1536:eKEUyvvuTXZFmA/CTUBxbClQUlwdk4RE3krgATps:7WvuTXtZGlQRdk4RBrgd
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/868-133-0x0000000010000000-0x0000000010037000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1292 868 WerFault.exe regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4832 wrote to memory of 868 4832 regsvr32.exe regsvr32.exe PID 4832 wrote to memory of 868 4832 regsvr32.exe regsvr32.exe PID 4832 wrote to memory of 868 4832 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4b1203ca9ee5f49218dd214913ea039ddf7c25a83eb0f830148d3f2a0b27bd8d.dll2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 5963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 868 -ip 8681⤵