Analysis
-
max time kernel
240s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 09:43
Behavioral task
behavioral1
Sample
4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098.dll
Resource
win7-20220901-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098.dll
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098.dll
-
Size
982KB
-
MD5
2360090c7e4ac31056cd2992831738ad
-
SHA1
7f5744e486d00663136dc7316677ca1c7570750a
-
SHA256
4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098
-
SHA512
8d9e2bd276a5a8019e1ef61fb438e542d18ff423a41b4d842b304ac5cf553cfa516755d06ae079e7e794e077abfaa56bd28391f1504849abbe25238d9e952633
-
SSDEEP
24576:Xm350aOUl3O2hKHG3jFrAiLGgLpdWiYwSLcz:XmG5m3hrAi6M/Yi
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3896 4724 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4724 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4724 4660 rundll32.exe 81 PID 4660 wrote to memory of 4724 4660 rundll32.exe 81 PID 4660 wrote to memory of 4724 4660 rundll32.exe 81 PID 4724 wrote to memory of 3896 4724 rundll32.exe 84 PID 4724 wrote to memory of 3896 4724 rundll32.exe 84 PID 4724 wrote to memory of 3896 4724 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a0ef352bd24ff1b1ffe0b8307fb809d1732638853c12f87866f994cca072098.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 7563⤵
- Program crash
PID:3896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4724 -ip 47241⤵PID:3748