Analysis
-
max time kernel
145s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca.dll
Resource
win10v2004-20221111-en
General
-
Target
a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca.dll
-
Size
600KB
-
MD5
ef39548718db6bc32ae5760666a8517c
-
SHA1
c7f76947f88dc4e7d4d0f3f8bc9472e0ed6bd904
-
SHA256
a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca
-
SHA512
91bcc6449937f4c32d0f6675bbb5b3d23d8fd03162322de6df7f0c45eb60ae682c0326d06e25625aef85d4c6c85e8877a13124afb2ea25c3bb7a2d8192ce5bd0
-
SSDEEP
12288:hZL7A5l0711g8onrOcWAqVv6NT81x4NCD:hZL7AfYhonS6FI4NCD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 908 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000a000000022e21-134.dat upx behavioral2/memory/908-136-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/files/0x000a000000022e21-137.dat upx behavioral2/memory/908-138-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3748 3664 WerFault.exe 84 1240 908 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3664 4276 rundll32.exe 84 PID 4276 wrote to memory of 3664 4276 rundll32.exe 84 PID 4276 wrote to memory of 3664 4276 rundll32.exe 84 PID 3664 wrote to memory of 908 3664 rundll32.exe 85 PID 3664 wrote to memory of 908 3664 rundll32.exe 85 PID 3664 wrote to memory of 908 3664 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5c44bfb4fd69e91ddc7928ecebdc1c7483404130c1dc14ffb6cc28c4d7103ca.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 2644⤵
- Program crash
PID:1240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 6123⤵
- Program crash
PID:3748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3664 -ip 36641⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 908 -ip 9081⤵PID:4472
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD512d840fc0b79a745c013e73c4c470467
SHA1f47b3c28974d6199e596c365f5e7161656480100
SHA2567ee9098ea2bc30eaea20eceb5e8cda620772c4ba2d7d6945e34ea93fb6054ccb
SHA512de5f3cb695f1a10d897968668ea403721e09f9c66db796d932b8152edb1681dbac777efb63a2cff9d81380d09452f90470a8b77363a99f21421b9ff61fcb930a
-
Filesize
125KB
MD512d840fc0b79a745c013e73c4c470467
SHA1f47b3c28974d6199e596c365f5e7161656480100
SHA2567ee9098ea2bc30eaea20eceb5e8cda620772c4ba2d7d6945e34ea93fb6054ccb
SHA512de5f3cb695f1a10d897968668ea403721e09f9c66db796d932b8152edb1681dbac777efb63a2cff9d81380d09452f90470a8b77363a99f21421b9ff61fcb930a