Analysis
-
max time kernel
95s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 15:19
Behavioral task
behavioral1
Sample
unknown_PID554_hiddenmodule_8F0000_x86.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unknown_PID554_hiddenmodule_8F0000_x86.dll
Resource
win10v2004-20220812-en
General
-
Target
unknown_PID554_hiddenmodule_8F0000_x86.dll
-
Size
144KB
-
MD5
1f672b4e8257e3dfd3d7eee04f1efac9
-
SHA1
9a2cbf2c742307eeea28c81cc1bbd713a882b4f1
-
SHA256
3e15a3bf700eb4cea2bd0d49ef100f295520972544a224d51501906d86ef7714
-
SHA512
28d23c8db00efadb63c27c54819ba562b6b802d518970378c89eec4719132c498b4a65d8e33215f0951cbc15ceb8a668e38d8f82aede0f905f5a6dc2776d8993
-
SSDEEP
3072:G6MvCeiR77JQyCEz62xG3A9JCXF0LTBfvy/1:LR77J1ZzhGw9J6F0LTBny/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3820 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4404 3820 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3820 rundll32.exe 3820 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3044 wrote to memory of 3820 3044 rundll32.exe rundll32.exe PID 3044 wrote to memory of 3820 3044 rundll32.exe rundll32.exe PID 3044 wrote to memory of 3820 3044 rundll32.exe rundll32.exe PID 3820 wrote to memory of 4112 3820 rundll32.exe wermgr.exe PID 3820 wrote to memory of 4112 3820 rundll32.exe wermgr.exe PID 3820 wrote to memory of 4112 3820 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unknown_PID554_hiddenmodule_8F0000_x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unknown_PID554_hiddenmodule_8F0000_x86.dll,#12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 8043⤵
- Program crash
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3820 -ip 38201⤵PID:5068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f530495445432d6ae00f2b0f08f7c804
SHA1f66f538b95b1a924c8392fbe7743d193d78eb50c
SHA2565cc51f26704eef3b59e6d33ea690fa5c62237627269493ead5bad6f71d2de07b
SHA5122b44ed622e63014a0d2d613d8bbc1548dd193460ce7711414dc4eb62a2aef69d57c9821f834555539b6a49f584cb46c5e82a9867ab0a0733d78e4f1d032d6ce8