Analysis
-
max time kernel
84s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05.dll
Resource
win10v2004-20220901-en
General
-
Target
7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05.dll
-
Size
118KB
-
MD5
0e118cb84d3b823b8db309915af7c650
-
SHA1
1e0d28c9da002699156a868294554f39b03e7622
-
SHA256
7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05
-
SHA512
63b74f0af2b362336b160d25ad22c311f10e5dda5acd8809deb72fb7421fcf5f06c2faf86175da74d516bfcfc43e5f4578f83f4d70d3db8e2919af2c6714d8e2
-
SSDEEP
1536:uD8NU1i2/QA+SR6OS5BSnRMbEdZppGaXDT5EQO4/JbEdPo0Ad4dk16nEnKdXL4Zm:uANYTQYMt2RJvDT6QztEBsEkgEnKds0
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 5016 rundll32.exe 6 5016 rundll32.exe 8 5016 rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\YW555.sys\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\YW555.sys" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3184 5016 WerFault.exe 80 -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 5016 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5016 rundll32.exe Token: SeTakeOwnershipPrivilege 5016 rundll32.exe Token: SeImpersonatePrivilege 5016 rundll32.exe Token: SeAssignPrimaryTokenPrivilege 5016 rundll32.exe Token: SeLoadDriverPrivilege 5016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3548 wrote to memory of 5016 3548 rundll32.exe 80 PID 3548 wrote to memory of 5016 3548 rundll32.exe 80 PID 3548 wrote to memory of 5016 3548 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e452d7c983e00271d5cedc1c74b2c5719196c26426384a14f3b5486b8344d05.dll,#12⤵
- Blocklisted process makes network request
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11923⤵
- Program crash
PID:3184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5016 -ip 50161⤵PID:3668