Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 17:26
Behavioral task
behavioral1
Sample
1680-97-0x0000000000250000-0x000000000027A000-memory.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1680-97-0x0000000000250000-0x000000000027A000-memory.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1680-97-0x0000000000250000-0x000000000027A000-memory.dll
-
Size
168KB
-
MD5
95d73563c8429ab1201c3f5c475cf53a
-
SHA1
18c7a0ff06d14ed2799ba5d92254334f14edb2ae
-
SHA256
6004e7bce21903f5c8b064b0e6a7bd83a68e52740879e04b6863983267150777
-
SHA512
daea97845543ce04ddd60ecbb0d6a45f222d2e1c58406ac9e07f655b7b164e5b6465cf2c1d8e0afac55800fd644b91ab521dd1634b3943e6da33354dd230b8b7
-
SSDEEP
3072:ogSPueeAMUSf/vGctAcJTRFg3TBfpA5O/yaGv:pzdDfXGcucJVFg3TBhAQ/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4828 1632 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4736 wrote to memory of 1632 4736 rundll32.exe rundll32.exe PID 4736 wrote to memory of 1632 4736 rundll32.exe rundll32.exe PID 4736 wrote to memory of 1632 4736 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1680-97-0x0000000000250000-0x000000000027A000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1680-97-0x0000000000250000-0x000000000027A000-memory.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1632 -ip 16321⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1632-132-0x0000000000000000-mapping.dmp