Analysis
-
max time kernel
281s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95.dll
Resource
win10v2004-20221111-en
General
-
Target
fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95.dll
-
Size
472KB
-
MD5
f95e647386993dfe4c12f602d15c3f00
-
SHA1
ae0e3377a4e66d018f1796b616f483e3de7dbaab
-
SHA256
fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95
-
SHA512
33eba483939780f586989a3a004e869f9c29301407a09bc86b87daedfd5cefd783cff7f4ec3ee921df6ecfb13574070e452f65c049075f4edb17ca318eb34694
-
SSDEEP
12288:6ehnaNPpSVZmNxRCwnwm3W3OHIIf5IYnA:6eh0PpS6NxNnwYeOHX1nA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4740 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x000b000000022de3-135.dat upx behavioral2/files/0x000b000000022de3-134.dat upx behavioral2/memory/4740-137-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3544 4740 WerFault.exe 81 3212 4380 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 60 wrote to memory of 4380 60 rundll32.exe 79 PID 60 wrote to memory of 4380 60 rundll32.exe 79 PID 60 wrote to memory of 4380 60 rundll32.exe 79 PID 4380 wrote to memory of 4740 4380 rundll32.exe 81 PID 4380 wrote to memory of 4740 4380 rundll32.exe 81 PID 4380 wrote to memory of 4740 4380 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaa8ecd43d8424a8cb783fb79eed03a7c3a723d532a466f684fb905d4067c95.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 2684⤵
- Program crash
PID:3544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6083⤵
- Program crash
PID:3212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4380 -ip 43801⤵PID:3692
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7