Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 06:59
Behavioral task
behavioral1
Sample
6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea.dll
Resource
win10v2004-20230220-en
General
-
Target
6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea.dll
-
Size
1.1MB
-
MD5
c31c64e17ba711e8a8952ab6146f0391
-
SHA1
f932e3ebfe31ac60f4abd8247c858d3f7f75f81e
-
SHA256
6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea
-
SHA512
3925298dea9cf075900bfea98824f25d30bf3b468f9efba3e90d07a860270ba7ee10d31c606a2dcf43316607583b9a9d9df1362140c07f19a3382b404debf47f
-
SSDEEP
24576:dxIjyq2UlU2xorw37AbiJVFNZK5Aozmy5+50B7Cgrw2XeLAzIYRkT/UK:dcfPnxwtT57zm950pCgpXJzIYmj
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 548 5080 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4456 wrote to memory of 5080 4456 rundll32.exe rundll32.exe PID 4456 wrote to memory of 5080 4456 rundll32.exe rundll32.exe PID 4456 wrote to memory of 5080 4456 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ee97f98f3399794e24f1a38b1e0deecdfba6eb4ff066313f1f646b5aaa3b6ea.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5080 -ip 50801⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5080-134-0x0000000002080000-0x000000000234A000-memory.dmpFilesize
2.8MB
-
memory/5080-133-0x0000000002080000-0x000000000234A000-memory.dmpFilesize
2.8MB
-
memory/5080-136-0x0000000002080000-0x000000000234A000-memory.dmpFilesize
2.8MB
-
memory/5080-137-0x0000000002080000-0x000000000234A000-memory.dmpFilesize
2.8MB
-
memory/5080-138-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-141-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-140-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-142-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-139-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-143-0x00000000024A0000-0x00000000025E0000-memory.dmpFilesize
1.2MB
-
memory/5080-144-0x0000000002080000-0x000000000234A000-memory.dmpFilesize
2.8MB