Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 04:39
Behavioral task
behavioral1
Sample
1760-96-0x0000000000280000-0x00000000002AA000-memory.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1760-96-0x0000000000280000-0x00000000002AA000-memory.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1760-96-0x0000000000280000-0x00000000002AA000-memory.dll
-
Size
168KB
-
MD5
071ee7299d174fcedf7b549c53e16910
-
SHA1
afa01ae8005c0ad5f30ac4855841e5e227696a5a
-
SHA256
0b8ff3c6e87fd060057f07eef9a1a91ae6f042ee18ee86ab8c7ba14d61feced7
-
SHA512
ad5f32f31e14e146cd79de23ad833ee08a811498d73d90b51a21486ab3caa73e27202735037bc70de0ab73e524556d2451fbeeadc1d808de9e9bb65eca17ecde
-
SSDEEP
3072:SgSLOfBP5nXy8ajjp54AmJCIDH3TBf5CgO/ya3v:28tVX3aHp5dmJpDH3TBRCD/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4720 4848 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4800 wrote to memory of 4848 4800 rundll32.exe rundll32.exe PID 4800 wrote to memory of 4848 4800 rundll32.exe rundll32.exe PID 4800 wrote to memory of 4848 4800 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1760-96-0x0000000000280000-0x00000000002AA000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1760-96-0x0000000000280000-0x00000000002AA000-memory.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 5723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4848 -ip 48481⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4848-132-0x0000000000000000-mapping.dmp