Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737.dll
Resource
win10v2004-20220812-en
General
-
Target
8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737.dll
-
Size
704KB
-
MD5
65ba661fd3498e2a8624dd68d2666220
-
SHA1
912bcb591a54ac3111c4a373c3b1f786aa530758
-
SHA256
8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737
-
SHA512
f2d24b80e3a509411a062c30edd96fa7a23718c7b88bb52815298dba1fab50992ad1a5875cbb2cf4e0819717db1757ccf2ea8325b37669269dd195c12a9644f7
-
SSDEEP
12288:Z0ywjWtUO+Oke04VGUl6vhOiue+bhPrRx4vSZqB7Y0lnMyC2+ES1eu:GCwsdPJyC29e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3792 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2216 2176 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2176 1112 rundll32.exe 79 PID 1112 wrote to memory of 2176 1112 rundll32.exe 79 PID 1112 wrote to memory of 2176 1112 rundll32.exe 79 PID 2176 wrote to memory of 3792 2176 rundll32.exe 80 PID 2176 wrote to memory of 3792 2176 rundll32.exe 80 PID 2176 wrote to memory of 3792 2176 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d69a4947ed74cff7356fae542d0c1c4e2794dd861ef30948990826345428737.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 6283⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2176 -ip 21761⤵PID:4768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52e7df5ae9dcabe137166989493d996a9
SHA100a2f1abd5480d5e23bf512a8ee37aa842f69b54
SHA2564c53f34aa96dc64de964e0f440218ea918b4ac56576323edb4626b17265bd8ef
SHA51238bbc02e1767a8337ce53c73c637d4d9ec883d9f966dff26fb92ecda6d56646166deb5836a7edfd43725408f2e31f07935dbfaf726e6ea77c64ade18bad42d8f
-
Filesize
76KB
MD52e7df5ae9dcabe137166989493d996a9
SHA100a2f1abd5480d5e23bf512a8ee37aa842f69b54
SHA2564c53f34aa96dc64de964e0f440218ea918b4ac56576323edb4626b17265bd8ef
SHA51238bbc02e1767a8337ce53c73c637d4d9ec883d9f966dff26fb92ecda6d56646166deb5836a7edfd43725408f2e31f07935dbfaf726e6ea77c64ade18bad42d8f