Analysis
-
max time kernel
76s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2022 07:18
Static task
static1
Behavioral task
behavioral1
Sample
InvoiceUpdate/NeedChangeRules.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
InvoiceUpdate/NeedChangeRules.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
InvoiceUpdate/Pays.cmd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
InvoiceUpdate/Pays.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
SCANS_HM6421.lnk
Resource
win7-20221111-en
General
-
Target
InvoiceUpdate/NeedChangeRules.dll
-
Size
733KB
-
MD5
b37107701ed8936daba7d88adb4fd128
-
SHA1
ae26543cc5e3b50f6b3edfdcc3b1f964354a31aa
-
SHA256
e1fb048ebc4508feaa9f9180b038943150ac472548fe92d32504d5b5b19a93f3
-
SHA512
91c3f1f68a05eea65b5113d75a59f6e68bc12b24cdcd4bdcf113cc7ed8a0de80720b2bbf7729c7317b389ec8cea1fd7c7e3d167d041f438f27695cf5dbbafe83
-
SSDEEP
12288:bx5BlbjoVPn84C8oSZTkwvFsaLJ5sU4gzplgWQnLI7QAeh+nqb7/ODsrETSeWBE:b/CP1jVtkBKzsU4gLgWZ7tqb72eR
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4512 1672 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1372 wrote to memory of 1672 1372 rundll32.exe rundll32.exe PID 1372 wrote to memory of 1672 1372 rundll32.exe rundll32.exe PID 1372 wrote to memory of 1672 1372 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\InvoiceUpdate\NeedChangeRules.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\InvoiceUpdate\NeedChangeRules.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1672 -ip 16721⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1672-132-0x0000000000000000-mapping.dmp