Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 01:57

General

  • Target

    be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll

  • Size

    180KB

  • MD5

    d3cfeb2fff051c170cf1e874af3b6300

  • SHA1

    5ec026d8bb6b1bb506ac1b484478c036a181021e

  • SHA256

    be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0

  • SHA512

    4c43f4ea33aa7f4de561244dcc57cfb0d431ab3ab95c57529ff2a65e53be6e0055efb950ebc335be09c38dfdff50cee32841c38c5e801506ec94c1773af0af9d

  • SSDEEP

    3072:wn4cV8gf2u41Z5tKlr78vicYq2tRtuNXF6Ge:q4y8gOl2578vicIUF6

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        PID:4720
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 268
          4⤵
          • Program crash
          PID:3928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4720 -ip 4720
    1⤵
      PID:452

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\rundll32Srv.exe

      Filesize

      90KB

      MD5

      dba1231fa077c41836df91398093d5a8

      SHA1

      9bd1adff712907f1cbff38194e7229af5d9b2938

      SHA256

      10576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a

      SHA512

      ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f

    • C:\Windows\SysWOW64\rundll32Srv.exe

      Filesize

      90KB

      MD5

      dba1231fa077c41836df91398093d5a8

      SHA1

      9bd1adff712907f1cbff38194e7229af5d9b2938

      SHA256

      10576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a

      SHA512

      ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f

    • memory/4720-136-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB