Analysis
-
max time kernel
152s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932.dll
Resource
win10v2004-20221111-en
General
-
Target
a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932.dll
-
Size
3.9MB
-
MD5
045d853f0cd009f71b5519e3b54d26f8
-
SHA1
972f166eae9b88bbd6ffc1a61a3d4a75793b143f
-
SHA256
a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932
-
SHA512
2e5bb045d97f1c135f30c8fe35b30120e49f17eb56b0303d61d347977ce000b3f3a3d2e70b1255152f5f8479a6a5d57077ee7d38b1a87b6c869a614bb7d1bdee
-
SSDEEP
49152:M5t7w2BHKIhxZx/MFA41A9QkBxvXxZyI+9n1Op09B/pw1f/xqBzcEA+62a6h/URx:M5Bw2Bzx0k9/BZXxkIWPG1f5e7aU2SzA
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4328 1316 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1644 wrote to memory of 1316 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1316 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1316 1644 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a265c3fc5fce88029aa567ea6f87b4a5af036d6647fb58ac872fa9cde78aa932.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 7323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1316 -ip 13161⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-132-0x0000000000000000-mapping.dmp