Analysis
-
max time kernel
48s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07-12-2022 16:28
Behavioral task
behavioral1
Sample
5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc.dll
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc.dll
Resource
win7-20221111-en
General
-
Target
5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc.dll
-
Size
159KB
-
MD5
eae620e8d73cf7622f2678d48acd2987
-
SHA1
55c9835006895bae67eb6c15051f3e090e9ef31d
-
SHA256
5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc
-
SHA512
0df0cb57d4058017384ecd3d38fd4aa190a437a4d322d2de47163a12a8bac7f9affad9fc6f7306cd39ece8e4b5700e4e05d35fe4df6068762abfeaed5ad5b873
-
SSDEEP
3072:ngikbXp3BvScvqzzxVvAAWJ6AzHHTBfZSMO/yapv:YTdRXvqXxh1WJJzHHTBRSX/
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4236 3772 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3772 rundll32.exe 3772 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3052 wrote to memory of 3772 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 3772 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 3772 3052 rundll32.exe rundll32.exe PID 3772 wrote to memory of 4256 3772 rundll32.exe wermgr.exe PID 3772 wrote to memory of 4256 3772 rundll32.exe wermgr.exe PID 3772 wrote to memory of 4256 3772 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a84a6811fea2dcac2dc50fd85ed24914d6ed5f8482b3365a62ae894298a19fc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 7723⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3772-117-0x0000000000000000-mapping.dmp
-
memory/3772-118-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-120-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-119-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-121-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-122-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-123-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-124-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-125-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-126-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-127-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-128-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-129-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-130-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-131-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-132-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-133-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-134-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-135-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-136-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-137-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-138-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-139-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-140-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-141-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-142-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-143-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-144-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-145-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-146-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-147-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-148-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-149-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-150-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-151-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-152-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-153-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-154-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-155-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-156-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-157-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-158-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-159-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-160-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-161-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-162-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-163-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-165-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-164-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-166-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-167-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-168-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB
-
memory/3772-169-0x0000000077470000-0x00000000775FE000-memory.dmpFilesize
1.6MB