Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01.dll
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01.dll
-
Size
7KB
-
MD5
30aadff117a25f6d898425333843fc00
-
SHA1
7d4809aa51fd460136d5fb6bf07142b451eb88a9
-
SHA256
f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01
-
SHA512
dbbcf34143ee00dc5a259c3041257c189ae813c5558df56046375e53240723d6d53db28d1d22589fa08c9f33f7b4a842512947ae7d45a916069594ab24a5aa23
-
SSDEEP
192:14bw+8Fxb2QrVpMdB5/TA5pIkCA5NY04G:EqxbRfMdL/TwpPY04G
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3500 448 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 448 4884 rundll32.exe 82 PID 4884 wrote to memory of 448 4884 rundll32.exe 82 PID 4884 wrote to memory of 448 4884 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1053d8e1ddbe94b1060b04db72133064adfc18bd3c963aae137c766a0293e01.dll,#12⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 6123⤵
- Program crash
PID:3500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 448 -ip 4481⤵PID:2324