Analysis
-
max time kernel
94s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:31
Behavioral task
behavioral1
Sample
e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16.dll
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16.dll
-
Size
16KB
-
MD5
0012270d13f8705c34dd61d84ec49410
-
SHA1
0e40bac08cdc0c17b90eb80308032458dc2a4e29
-
SHA256
e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16
-
SHA512
6ef9120dee1bfae470e9d0c2a3d2f1fce65777ed36ca3331970c0093bd4993629e90dbd0b28db8fb94bf49efb8bf834a9e339475c0da742ea05925558afeb6ab
-
SSDEEP
384:S9a7L+KQ6B1WiXZopmPgzXmRYElh1LB9RTlnXLRbzlG:SYW6rGpUIJmLNlXFb8
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4624-133-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1756 4624 WerFault.exe 76 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4624 3080 rundll32.exe 76 PID 3080 wrote to memory of 4624 3080 rundll32.exe 76 PID 3080 wrote to memory of 4624 3080 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e79f91917cd506858eed5ac35e3a3da9ab889ed7b2da2734b682fe958b204c16.dll,#12⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 6003⤵
- Program crash
PID:1756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4624 -ip 46241⤵PID:3196