Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc.dll
Resource
win10v2004-20220812-en
General
-
Target
37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc.dll
-
Size
9KB
-
MD5
ef893e6d071af660a0cd4022d45cc300
-
SHA1
b0aedeb9792b575a8339d8e04c57d163d8151de9
-
SHA256
37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc
-
SHA512
e7169bb1fe6967e31c86357e4e65f2c44158447b2c18a2fa839a5d19a9b4967c451ef0c17d5d4167444260e8c475d0f00b07260f71479ebef4eeb5831f823bf0
-
SSDEEP
192:hNo5kmXmEEnkITKoUBQIEtNvokhF5hDJtKfnv23qJthDNp0:71mWEHI2oT7Nh9Dqv6qJtN70
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 992 2032 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2028 wrote to memory of 2032 2028 rundll32.exe 27 PID 2032 wrote to memory of 992 2032 rundll32.exe 28 PID 2032 wrote to memory of 992 2032 rundll32.exe 28 PID 2032 wrote to memory of 992 2032 rundll32.exe 28 PID 2032 wrote to memory of 992 2032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37f5ef4bc91b946ab6a9c48000d9c65eefa569835ce667412f270a7cbbfa90dc.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2363⤵
- Program crash
PID:992
-
-