Analysis
-
max time kernel
194s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 03:53
Static task
static1
Behavioral task
behavioral1
Sample
6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a.dll
Resource
win10v2004-20221111-en
General
-
Target
6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a.dll
-
Size
560KB
-
MD5
0a5113eb522356640a2a99c22b6f6c72
-
SHA1
c956dcf0e01b0163738178c86ece82f135101759
-
SHA256
6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a
-
SHA512
d883b39f20e11d232e4af0725b81f297db23efb891128f2fd5983bab9068c9a120caa2c45638c9574858f076e3345a7e8548f66f5a0daf2f9abf45b3405b0a60
-
SSDEEP
12288:IiY0EJ5OYJ/b+jM+j2TAb7z/gAJQjqpdBvA:XY0wpF+A+/gkQjqfBv
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4540 4240 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2956 wrote to memory of 4240 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 4240 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 4240 2956 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d5b345798e57ab70021d58adeba8702e9f31c5ea152a6a7099a2d603bebb95a.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4240 -ip 42401⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4240-132-0x0000000000000000-mapping.dmp