Analysis
-
max time kernel
112s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 07:45
Behavioral task
behavioral1
Sample
c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8.dll
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8.dll
-
Size
170KB
-
MD5
3a9bf0b4b32a78016649ba2ee6c04eee
-
SHA1
bda33471b99fae190c95137a54d3f3c0f6bfe3f8
-
SHA256
c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8
-
SHA512
73fc2fd7232a34bc60fea5a7dfc2dbf5d86507a996976bf64c05fb42b2f0902e37b62d41b8ccf221eac9ff2228ac9348e751c135229ad315ac69b14467bc4299
-
SSDEEP
3072:DvcCUevFdKvBJZ+PtNyikGRadrT0VLLoOWVqjJSt1DieOOS1VmRa0FiR3X:DvcMsVviXqrT0VIV4EieODnmRw3X
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4844-133-0x0000000010000000-0x0000000010086000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4288 4844 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 4844 848 rundll32.exe 82 PID 848 wrote to memory of 4844 848 rundll32.exe 82 PID 848 wrote to memory of 4844 848 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5d45ce8f5c3be82e5ecc060b8eb4e469584ef7c227852fc58bf300ac9a7fae8.dll,#12⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 6123⤵
- Program crash
PID:4288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4844 -ip 48441⤵PID:2224