Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 21:32
Behavioral task
behavioral1
Sample
ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94.dll
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94.dll
-
Size
134KB
-
MD5
55d539db2115af352da78d6e598f9dba
-
SHA1
396f6c9215c3ef4279e27b15c7cd3c8fad8d240e
-
SHA256
ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94
-
SHA512
3190223891a8b07e49d5c22bfa6fa3d831a6e369351ac82acb53a8f538b87f99e3827762bc01f2ec516d8d81a36df3c5bc3c6cb5496750d9b0e04169a877275b
-
SSDEEP
3072:OYsvVxGf6etSkipCRP2HSxGRA7JiGn28TBfPfYGWc:OPuf6ecDC1xGa7Jfn28TBHAGWc
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1092 4700 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4700 rundll32.exe 4700 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4700 4276 rundll32.exe 81 PID 4276 wrote to memory of 4700 4276 rundll32.exe 81 PID 4276 wrote to memory of 4700 4276 rundll32.exe 81 PID 4700 wrote to memory of 1856 4700 rundll32.exe 82 PID 4700 wrote to memory of 1856 4700 rundll32.exe 82 PID 4700 wrote to memory of 1856 4700 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab431fe12211c9244be3e4bf7539c95a1fa77676bb68b6f454002969509c6e94.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 7683⤵
- Program crash
PID:1092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4700 -ip 47001⤵PID:4236