Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 15:19
Behavioral task
behavioral1
Sample
unknown_PID554_hiddenmodule_8F0000_x86.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unknown_PID554_hiddenmodule_8F0000_x86.dll
Resource
win10v2004-20220812-en
General
-
Target
unknown_PID554_hiddenmodule_8F0000_x86.dll
-
Size
144KB
-
MD5
1f672b4e8257e3dfd3d7eee04f1efac9
-
SHA1
9a2cbf2c742307eeea28c81cc1bbd713a882b4f1
-
SHA256
3e15a3bf700eb4cea2bd0d49ef100f295520972544a224d51501906d86ef7714
-
SHA512
28d23c8db00efadb63c27c54819ba562b6b802d518970378c89eec4719132c498b4a65d8e33215f0951cbc15ceb8a668e38d8f82aede0f905f5a6dc2776d8993
-
SSDEEP
3072:G6MvCeiR77JQyCEz62xG3A9JCXF0LTBfvy/1:LR77J1ZzhGw9J6F0LTBny/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1772 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1940 1772 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1772 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1720 wrote to memory of 1772 1720 rundll32.exe rundll32.exe PID 1772 wrote to memory of 1648 1772 rundll32.exe wermgr.exe PID 1772 wrote to memory of 1648 1772 rundll32.exe wermgr.exe PID 1772 wrote to memory of 1648 1772 rundll32.exe wermgr.exe PID 1772 wrote to memory of 1648 1772 rundll32.exe wermgr.exe PID 1772 wrote to memory of 1940 1772 rundll32.exe WerFault.exe PID 1772 wrote to memory of 1940 1772 rundll32.exe WerFault.exe PID 1772 wrote to memory of 1940 1772 rundll32.exe WerFault.exe PID 1772 wrote to memory of 1940 1772 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unknown_PID554_hiddenmodule_8F0000_x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unknown_PID554_hiddenmodule_8F0000_x86.dll,#12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 3603⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\6B3CE807.dllFilesize
268KB
MD553bb811ed12d2c867b354390fabf9612
SHA181b29c540c0e2a09385cf7e821639ff64fbffd91
SHA256a972b482b09e50875c5cdc2cfd6c9b2fa96c9dbf9d23894d0b3061c97145b133
SHA5125f7b584b9b42b0dc6ebbd3571cac1bc07c16301a994c9891201007c7b8698ef4604b2cc1f7e9a2edb016e50d415a6a9ca390a0df89bab01c889c7d382d2e8d24
-
memory/1772-54-0x0000000000000000-mapping.dmp
-
memory/1772-55-0x0000000074BB1000-0x0000000074BB3000-memory.dmpFilesize
8KB
-
memory/1940-57-0x0000000000000000-mapping.dmp