Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll
Resource
win10v2004-20220901-en
General
-
Target
be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll
-
Size
180KB
-
MD5
d3cfeb2fff051c170cf1e874af3b6300
-
SHA1
5ec026d8bb6b1bb506ac1b484478c036a181021e
-
SHA256
be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0
-
SHA512
4c43f4ea33aa7f4de561244dcc57cfb0d431ab3ab95c57529ff2a65e53be6e0055efb950ebc335be09c38dfdff50cee32841c38c5e801506ec94c1773af0af9d
-
SSDEEP
3072:wn4cV8gf2u41Z5tKlr78vicYq2tRtuNXF6Ge:q4y8gOl2578vicIUF6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4720 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x0007000000022de8-135.dat upx behavioral2/files/0x0007000000022de8-134.dat upx behavioral2/memory/4720-136-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3928 4720 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3248 wrote to memory of 1984 3248 rundll32.exe 82 PID 3248 wrote to memory of 1984 3248 rundll32.exe 82 PID 3248 wrote to memory of 1984 3248 rundll32.exe 82 PID 1984 wrote to memory of 4720 1984 rundll32.exe 83 PID 1984 wrote to memory of 4720 1984 rundll32.exe 83 PID 1984 wrote to memory of 4720 1984 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be23ba1629b95f90538753d5eca01909431fe880d1f8fca627ab036ca8dd02f0.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 2684⤵
- Program crash
PID:3928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4720 -ip 47201⤵PID:452
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5dba1231fa077c41836df91398093d5a8
SHA19bd1adff712907f1cbff38194e7229af5d9b2938
SHA25610576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a
SHA512ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f
-
Filesize
90KB
MD5dba1231fa077c41836df91398093d5a8
SHA19bd1adff712907f1cbff38194e7229af5d9b2938
SHA25610576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a
SHA512ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f