Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll
Resource
win10v2004-20220901-en
General
-
Target
18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll
-
Size
285KB
-
MD5
755c09a2bd28d200065323dc7ad2e6b0
-
SHA1
dc365512854f656bcc6b6a86b6f3671ae38b8a38
-
SHA256
18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d
-
SHA512
3829851c66988d5bd85a0325d4b80496918af6f97d337dbcfb4296e6f5cb089312c8c0ed54013d1c353f9b209eea88dbfc67dfdced4872421133f6614c645e59
-
SSDEEP
6144:JB9OCh1IOOcPWSMOjLWNuDB+j05tpJUJafY3/G:JB9O7jwWS4Aj6kYO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1856 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0002000000022ddb-134.dat upx behavioral2/files/0x0002000000022ddb-135.dat upx behavioral2/memory/1856-137-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 396 1856 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 996 wrote to memory of 1804 996 rundll32.exe 81 PID 996 wrote to memory of 1804 996 rundll32.exe 81 PID 996 wrote to memory of 1804 996 rundll32.exe 81 PID 1804 wrote to memory of 1856 1804 rundll32.exe 82 PID 1804 wrote to memory of 1856 1804 rundll32.exe 82 PID 1804 wrote to memory of 1856 1804 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f89e2bc82207b6487b8ea370dc3bb8064ddc896ba6924b77a033eeaf6e5a2d.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2644⤵
- Program crash
PID:396
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1856 -ip 18561⤵PID:2040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD503458f75016342531765a7def629c6fe
SHA17e14e6534123ce7e51aafa2ccda4688a4524eeaf
SHA256860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f
SHA5122db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198
-
Filesize
132KB
MD503458f75016342531765a7def629c6fe
SHA17e14e6534123ce7e51aafa2ccda4688a4524eeaf
SHA256860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f
SHA5122db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198